Detecting Intruder and Black Hole Attackers in Mobile Adhoc Network

International Journal of Electronics and Communication Engineering
© 2024 by SSRG - IJECE Journal
Volume 11 Issue 4
Year of Publication : 2024
Authors : S. Hemalatha, Maddala Janakidevi, Pullela SVVSR Kumar, M.S. Arunkumar, Sanjeevkumar Angadi, T. Muruganantham, R. Hamsalekha, T. Vijay Muni
pdf
How to Cite?

S. Hemalatha, Maddala Janakidevi, Pullela SVVSR Kumar, M.S. Arunkumar, Sanjeevkumar Angadi, T. Muruganantham, R. Hamsalekha, T. Vijay Muni, "Detecting Intruder and Black Hole Attackers in Mobile Adhoc Network," SSRG International Journal of Electronics and Communication Engineering, vol. 11,  no. 4, pp. 80-88, 2024. Crossref, https://doi.org/10.14445/23488549/IJECE-V11I4P109

Abstract:

Making the packet transfer communication among the wireless nodes in Mobile Adhoc Network is a tedious task due to the nature of the communication nodes and the suspicious nodes’ activities like intruders and attackers. Much research work was concentrated on thwarting the packet delay node and dropping the node in the transmission with the support of modern techniques and internal node parameter monitoring that are supplementary work to the node’s communication and reduce the performance of the nodes. This paper anticipated a new algorithm named classification algorithm with a simple forward time of the node parameter to predict the intruder node as well as the black hole attacker in the communication. The proposed effort was called a Classification algorithm-based intruder as well as a Black Hole Attack AODV, and it was tested with the simulator. The outcome was compared with the normal AODV method. The simulation results showed that the proposed CAIBHA-AODV worked better packet delivery, less delay and attack detection time and constant attack rate compared with the normal AODV.

Keywords:

MANET, Intruder, Black Hole Attackers, Suspicious node, Classification algorithm, Forward time.

References:

[1] Tawseef Ahmad Teli, Rameez Yousuf, and Dawood Ashraf Khan, “MANET Routing Protocols Attacks and Mitigation Techniques: A Review,” International Journal of Mechanical Engineering, vol. 7, no. 2, pp. 1468-1478, 2022.
[Google Scholar] [Publisher Link]
[2] R. Thiagarajan et al., “Optimized with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET,” Wireless Personal Communications, vol. 119, pp. 21-35, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Shashi Gurung, and Siddhartha Chauhan, “A Survey of Black-Hole Attack Mitigation Techniques in MANET: Merits, Drawbacks, and Suitability,” Wireless Networks, vol. 26, pp. 1981-2011, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Nitin Khanna, and Monika Sachdeva, “A Comprehensive Taxonomy of Schemes to Detect and Mitigate Blackhole Attack and Its Variants in MANETs,” Computer Science Review, vol. 32, pp. 24-44, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Gautam M. Borkar, and A.R. Mahajan, “A Review on Propagation of Secure Data, Prevention of Attacks and Routing in Mobile Ad-Hoc Networks,” International Journal of Communication Networks and Distributed Systems, vol. 24, no. 1, pp. 23-57, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[6] Nagaraj Balakrishnan, Arunkumar Rajendran, and Ajay P., “Deep Embedded Median Clustering for Routing Misbehaviour and Attacks Detection in Ad-Hoc Networks,” Ad Hoc Networks, vol. 126, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Anshu Kumari, Madhvi Singhal, and Nishi Yadav, “Black Hole Attack Implementation and Its Performance Evaluation Using AODV Routing in MANET,” Inventive Communication and Computational Technologies, pp. 431-438, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[8] Kollu Spurthi, and T.N. Shankar, “Hybrid Energy Efficient Secured Attribute Based ZRP Aiding Authentic Data Transmission,” Journal of Scientific & Industrial Research, vol. 81, no. 1, pp. 69-75, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[9] R. Suma, B.G. Premasudha, and V. Ravi Ram, “A Novel Machine Learning-Based Attacker Detection System to Secure Location Aided Routing in MANETs,” International Journal of Networking and Virtual Organisations, vol. 22, no. 1, pp. 17-41, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Neenavath Veeraiah, and B.T. Krishna, “An Approach for Optimal-Secure Multi-Path Routing and Intrusion Detection in MANET,” Evolutionary Intelligence, vol. 15, pp. 1313-1327, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Neenavath Veeraiah et al., “Trust Aware Secure Energy Efficient Hybrid Protocol for MANET,” IEEE Access, vol. 9, pp. 120996-121005, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Nitesh Ghodichor et al., “Secure Routing Protocol against Internal and External Attack in MANET,” Proceedings of the International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, pp. 1-8, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Pooja Rani et al., “Mitigation of BH and Gray Hole Attack Using Swarm Inspired Algorithm with Artificial Neural Network,” IEEE Access, vol. 8, pp. 121755-121764, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Dost Muhammad Khan et al., “Black Hole Attack Prevention in Mobile Ad-Hoc Network (MANET) Using Ant Colony Optimization Technique,” Information Technology and Control, vol. 49, no. 3, pp. 308-319, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[15] Mahuwa Goswami, Prashant Sharma, Ankita Bhargava, “Black Hole Attack Detection in MANETs Using Trust Based Technique,” International Journal of Innovative Technology and Exploring Engineering, vol. 9, no. 4, pp. 1446-1451, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Zohaib Hassan et al., “Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles,” IEEE Access, vol. 8, pp. 199618-199628, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Sadoon Hussain et al., “AI-Enabled Ant-Routing Protocol to Secure Communication in Flying Networks,” Applied Computational Intelligence and Soft Computing, vol. 2022, pp. 1-9, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[18] Mohamad T. Sultan, Hesham El Sayed, and Manzoor Ahmed Khan, “An Intrusion Detection Mechanism for MANETs Based on Deep Learning Artificial Neural Networks (ANNs),” International Journal of Computer Networks & Communications, vol. 15, no. 1, pp. 1-15, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[19] Shweta Pandey, and Varun Singh, “Blackhole Attack Detection Using Machine Learning Approach on MANET,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), Coimbatore, India, pp. 797-802, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Maria Hanif et al., “AI-Based Wormhole Attack Detection Techniques in Wireless Sensor Networks,” Electronics, vol. 11, no. 15, pp. 1- 28, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Sivanesan Narayanan, and A. Rajesh, “Mitigating Intruder Detection System in Mobile Adhoc Network (MANET) Using Optimizer Based ANN Model,” KeAi: Cyber Security & Applications, pp. 1-13, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[22] S. Murali, and V. Sathya, “Reliability Assessment and Detection of Nodes Causing a Blackhole Attack in Portable Informal Networks,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 8s, pp. 173-185, 2024.
[Google Scholar] [Publisher Link]
[23] Shaik Shafi, S. Mounika, and S. Velliangiri, “Machine Learning and Trust Based AODV Routing Protocol to Mitigate Flooding and Blackhole Attacks in MANET,” Procedia Computer Science, vol. 218, pp. 2309-2318, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[24] S. Vijayalakshmi et al., “Hybrid Defense Mechanism against Malicious Packet Dropping Attack for MANET Using Game Theory,” Cyber Security and Applications, vol. 1, pp. 1-9, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[25] Sampada H.K., and Shobha K.R., “Co-Ordinated Blackhole and Grayhole Attack Detection Using Smart & Secure Ad Hoc On-Demand Distance Vector Routing Protocol in MANETs,” International Journal of Computer Networks and Applications (IJCNA), vol. 11, no. 1, pp. 13-28, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[26] C. Edwin Singh, and S. Maria Celestin Vigila, “Fuzzy Based Intrusion Detection System in MANET,” Measurement: Sensors, vol. 26, pp. 1-6, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[27] Oyenike Mary Olanrewaju, Abdulwasiu Adebayo Abdulhafeez Abdulwasiu, and Abdulhafiz Nuhu, “Enhanced On-Demand Distance Vector Routing Protocol to Prevent Blackhole Attack in MANET,” International Journal of Software Engineering and Computer Systems, vol. 9, no. 1, pp. 68-75, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[28] Jayantkumar A. Rathod, and Manjunath Kotari, “TriChain: Kangaroo-Based Intrusion Detection for Secure Multipath Route Discovery and Route Maintenance in MANET Using Advanced Routing Protocol,” International Journal of Computer Networks and Applications (IJCNA), vol. 11, no. 1, pp. 61-81, 2024.
[CrossRef] [Google Scholar] [Publisher Link]
[29] Jyoti Dhanke et al., “An Efficient Approach for Prevention of Blackhole Attack in MANET,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 12s, pp. 743-752, 2024.
[Google Scholar] [Publisher Link]
[30] Aurelle Tchagna Kouanou et al., “Machine Learning for Intrusion Detection in Ad-hoc Networks: Wormhole and Blackhole Attacks Case,” Cloud Computing and Data Science [Internet], vol. 5, no. 1, pp. 62-79, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[31] Ashraf Abdelhamid et al., “A Lightweight Anomaly Detection System for Black Hole Attack,” Electronics, vol. 12, no. 6, pp. 1-18, 2023.
[CrossRef] [Google Scholar] [Publisher Link]