scispace - formally typeset
Journal ArticleDOI

ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing

Nilesh Marathe, +1 more
- 01 Jul 2019 - 
- Vol. 107, Iss: 1, pp 393-416
Reads0
Chats0
TLDR
The proposed consolidated approach, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network, which enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency.
Abstract
The feature of Dynamic topology configuration of MANET reciprocates the security constraints and bring in many security threats that hamper the routing and time bound delivery of packets. Many security schemes had been proposed to secure MANET routing and improve its efficiency. The solutions proposed by existing systems are defined in one dimension so that the targeted attack can be fixed up, but that might create flaws in other dimension or introduce new attack. So it is necessary to create a multidimensional solution that empowers the routing process to become inherently secure rather than defending one particular attack. The selfish or maliciously behaving nodes in the network are the key players in launching the attacks and disrupting the routing process. In this paper, the proposed consolidated approach named, IDS and Trust solution Collaborated with Ack based approach (ITCA), performs identification of attack, isolation of misbehaving nodes and control behavior of nodes in the network. This enables the routing process to be more robust by resisting the malicious nodes from being the part of a route, avoid attack formation and thus supports to improve the efficiency. Even though the malicious nodes are isolated, the proposed method allows them to be sender for transmitting their own data, but under controlled environment defined by IDS so that the attempt to launch DOS attack can be avoided. The reconsideration of isolated node that to under controlled IDS environment in collaboration with Trust and improved ACK based scheme is key behind proposed multidimensional method, ITCA. Further the method is integrated with AODV and extensive experimentation is done based on raising number of malicious nodes in the network to measure its effectiveness and efficiency.

read more

Citations
More filters
Journal ArticleDOI

Accurate and Cognitive Intrusion Detection System (ACIDS): a Novel Black Hole Detection Mechanism in Mobile Ad Hoc Networks

TL;DR: An intrusion detection system called ‘Accurate and Cognitive Intrusion Detection System’ (ACIDS) for detecting the most vulnerable packet dropping attack known as black hole attack has been developed and the results attest to the efficacy of ACIDS over AODV routing protocol in detecting packet dropping scenarios of the black holes attack.
Journal ArticleDOI

Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud

TL;DR: In this article, a trust-aware intrusion detection and prevention system (TA-IDPS) is proposed for protecting the network from adversaries, which consists of a MANET, a cloudlet and a cloud service layer.
Journal ArticleDOI

Novel trust evaluation using NSGA-III based adaptive neuro-fuzzy inference system

TL;DR: Comparative analysis reveals that the proposed trust evaluation model outperforms the competitive trust evaluation models in terms of various performance metrics such as routing overheads, average end to end latency, packet delivery ratio, and throughput, and the proposed protocol is more secure against various security threats.
Book ChapterDOI

Improved ITCA Method to Mitigate Network-Layer Attack in MANET

TL;DR: The Improved ITCA is proposed, which introduces a lightweight real-time option for secured ACK-based approach, whereas adaptive application-specific trust calculation parameters make the system more robust or work efficiently even when percentage of malicious node in the network is high.
Journal ArticleDOI

Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET

TL;DR: The proposed framework utilize the benefit of Reputation and Trust based evaluation process to secure route discovery by isolating malicious nodes at early stage of route formation by incorporating multi-dimensional multi-attribute system (MDMA).
References
More filters

A survey of routing attacks in mobile ad hoc networks s ecurity i n w ireless m obile a d h oc a nd s ensor n etworks

TL;DR: In this paper, the authors investigate the state-of-the-art of security issues in MANET and examine routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks.
Journal ArticleDOI

A survey of routing attacks in mobile ad hoc networks

TL;DR: This article investigates the state-of-the-art of security issues in MANET and examines routing attacks, such as link spoofing and colluding misrelay attacks, as well as countermeasures against such attacks in existing MANET protocols.
Journal ArticleDOI

Trust prediction and trust-based source routing in mobile ad hoc networks

TL;DR: This paper presents a dynamic trust prediction model to evaluate the trustworthiness of nodes, which is based on the nodes’ historical behaviors, as well as the future behaviors via extended fuzzy logic rules prediction, and integrated the proposed trust predication model into the Source Routing Mechanism.
Journal ArticleDOI

AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments

TL;DR: This paper proposes a new routing protocol, i.e., authenticated anonymous secure routing (AASR), to satisfy the requirement and defend against the attacks, and demonstrates the effectiveness of the proposed AASR protocol with improved performance as compared with the existing protocols.
Journal ArticleDOI

Building a trusted route in a mobile ad hoc network considering communication reliability and path length

TL;DR: A novel trusted route that considers communication reliability and path length for a reliable and feasible packet delivery in a MANET, and introduces the concept of attribute similarity in finding potentially friendly nodes among strangers.
Related Papers (5)