Skip to main content
Log in

DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad-hoc network is an interesting network, which is classified as an autonomous system. These types of networks are constructed based on low capacity wireless links, without having a centralized infrastructure system. Lack of central monitoring system makes it so vulnerable to an insider attack. These attacks consist of two main categories; false data and false route attack. An efficient intrusion detection system (IDS) should have a good understanding about the categories. It can be defined by comparison between (true positive network throughput/false throughput) and the packet delivery ratio. This paper, DNACK is proposed based on Digital Signature and standard method of Negative Acknowledgment, which is a new method of false data detection in case of en-route filtering IDS. DNACK members can detect both kinds of insider attacks, a false data (false data injected and false modified messages) and false route attacks (packet dropping and flooding attack), regards to DNACK characteristic. The false data will be detected based on source digital signature by upcoming member and the routing attacks, will be monitored by the last member. The network efficiency shall be guaranteed by using of DNACK because of the high percentage of Packet delivery and the minimum of false throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Balakrishnan, K., et al. (2005). TWOACK: Preventing selfishness in mobile ad hoc networks. In Wireless communications and networking conference, 2005 IEEE (pp. 2137–2142).

  2. Xinyu, Y. et al. (2012). A novel en-route filtering scheme against false data injection attacks in cyber-physical networked systems. In Distributed computing systems (ICDCS), 2012 IEEE 32nd international conference on (pp. 92–101).

  3. Liu, K., et al. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. Mobile Computing, IEEE Transactions on, 6, 536–550.

    Article  Google Scholar 

  4. Zhang, Z., Xiong, X., & Deng, J. (2012). A novel key chain-based en-route filtering protocol for wireless sensor networks.

  5. Wahengbam, M., & Marchang, N. (2012). Intrusion detection in MANET using fuzzy logic. In Emerging trends and applications in computer science (NCETACS), 2012 3rd national conference on (pp. 189–192).

  6. Sun, H.-M., et al. (2012). A novel acknowledgment-based approach against collude attacks in MANET. Expert Systems with Applications, 39, 7968–7975.

    Article  Google Scholar 

  7. Jeba, S. A., & Paramasivan, B. (2012). An evaluation of en-route filtering schemes on wireless sensor networks. International Journal of Computer Engineering & Technology (IJCET), 3, 62–73.

  8. Jeba, S. A., & Paramasivan, B. (2012). False data injection attack and its countermeasures in wireless sensor networks. European Journal of Scientific Research, 82, 248–257.

    Google Scholar 

  9. Song, N. et al. (2005). Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach. In Parallel and distributed processing symposium, 2005. Proceedings. 19th IEEE international (p. 8).

  10. Chiu, H. S., & Lui, K.-S. (2006). DelPHI: Wormhole detection mechanism for ad hoc wireless networks. In Wireless pervasive computing, 2006 1st international symposium on (p. 6).

  11. Gupta, S. et al. (2011). WHOP: Wormhole attack detection protocol using hound packet. In Innovations in information technology (IIT), 2011 international conference on (pp. 226–231).

  12. Kraub, C. et al. (2007). STEF: A secure ticket-based en-route filtering scheme for wireless sensor networks. In Availability, reliability and security, 2007. ARES 2007. The second international conference on (pp. 310–317).

  13. Du, W. et al. (2003). A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM conference on computer and communications security (pp. 42–51).

  14. Wang, H., Li, Q. (2007). PDF: A public-key based false data filtering scheme in sensor networks. In Wireless algorithms, systems and applications, 2007. WASA 2007. International conference on (pp. 129–138).

  15. Li, W., & Fei, G. (2010). A secure clustering scheme protocol for MANET. In Multimedia information networking and security (MINES), 2010 international conference on (pp. 785–789).

  16. Cho, J.-H., & Chen, I.-R. (2011). Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks. Performance Evaluation, 68, 58–75.

    Article  Google Scholar 

  17. Bala Krishna, M., & Doja, M. N. (2011). Symmetric key management and distribution techniques in wireless ad hoc networks. In Computational intelligence and communication networks (CICN), 2011 international conference on (pp. 727–731).

  18. Perrig, A., et al. (2002). SPINS: Security protocols for sensor networks. Wireless networks, 8, 521–534.

    Article  MATH  Google Scholar 

  19. Chan, A. C. F. (2004). Distributed symmetric key management for mobile ad hoc networks. In INFOCOM 2004. Twenty-third annual joint conference of the IEEE computer and communications societies (vol. 4, pp. 2414–2424).

  20. Ertaul, L., & Lu, W. (2005). ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I). In NETWORKING 2005. Networking technologies, services, and protocols; performance of computer and communication networks; mobile and wireless communications systems (pp. 102–113). Springer.

  21. Zhu, S. et al. (2004). An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks. In Security and privacy, 2004. Proceedings. 2004 IEEE symposium on (pp. 259–271).

  22. Zhang, Y. et al. (2005). Securing sensor networks with location-based keys. In Wireless communications and networking conference, 2005 IEEE (pp. 1909–1914).

  23. Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Computing and Communications Review, 6, 106–107.

    Article  Google Scholar 

  24. Yu, H., & He, J. (2013). Authentication and en-route data filtering for wireless sensor networks in the internet of things scenario. International Journal of Grid and Distributed Computing, 6, 1–12.

    MathSciNet  Google Scholar 

  25. Li, F., & Wu, J. (2006). A probabilistic voting-based filtering scheme in wireless sensor networks. In Proceedings of the 2006 international conference on wireless communications and mobile computing (pp. 27–32).

  26. Luo, J., et al. (2009). A survey of multicast routing protocols for mobile ad-hoc networks. Communications Surveys & Tutorials, IEEE, 11, 78–91.

    Google Scholar 

  27. Wang, W., et al. (2013). Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks. Information Sciences, 220, 580–602.

    Article  Google Scholar 

  28. Selvamani, K. et al. (2012). A hybrid framework of intrusion detection system for resource consumption based attacks in wireless ad-hoc networks. In Systems and informatics (ICSAI), 2012 international conference on (pp. 8–12).

  29. Ye, F. et al. (2004). Statistical en-route filtering of injected false data in sensor networks. In INFOCOM 2004. Twenty-third annual joint conference of the IEEE computer and communications societies (pp. 2446–2457).

Download references

Acknowledgments

This work was supported by Malaysia-Japan International Institute of Technology (MJIIT) center at Universiti Teknologi Malaysia.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Babak Emami Abarghouei.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abarghouei, B.E., Farokhtala, A. & Alizadeh, M. DNACK: False Data Detection Based on Negative Acknowledgment and Digital Signature on Mobile Ad-hoc Network. Wireless Pers Commun 83, 1–15 (2015). https://doi.org/10.1007/s11277-015-2327-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2327-0

Keywords

Navigation