International Journal of Wireless and Ad Hoc Communication

Journal DOI

https://doi.org/10.54216/IJWAC

Submit Your Paper

2692-4056ISSN (Online)
Full Length Article

International Journal of Wireless and Ad Hoc Communication

Volume 3, Issue 1, PP: 49-58, 2021 | Cite this article as | XML | | Html PDF

Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks

Lamia F. Tulaib   1 * , Akbal O. Salman   2 , Mazin A. Mohammed   3

  • 1 College of Dentistry, University of Anbar, 31001, Anbar, Iraq - (den.lamia.faris@uoanbar.edu.iq)
  • 2 Department of Control & Automation Techniques Engineering, Electrical Engineering Technical College, Middle Technical University, 06800, Baghdad, Iraq - ( mazinalshujeary@uoanbar.edu.iq)
  • 3 Information Systems Department, College of Computer Science and Information Technology, University of Anbar, 31001, Anbar, Iraq - (akbal.o.salman@mtu.edu.iq)
  • Doi: https://doi.org/10.54216/IJWAC.030105

    Received: March 23, 2021 Accepted: August 15, 2021
    Abstract

    As a result of the inherent weaknesses of the wireless medium, ad hoc networks are susceptible to a broad variety of threats and assaults. As a direct consequence of this, intrusion detection, as well as security, privacy, and authentication in ad-hoc networks, have developed into a primary focus of the current study. This body of research aims to identify the dangers posed by a variety of assaults that are often seen in wireless ad-hoc networks and provide strategies to counteract those dangers. The Black hole assault, Wormhole attack, Selective Forwarding attack, Sybil attack, and Denial-of-Service attack are the specific topics covered in this proposed work. In this paper, we describe a trust-based safe routing protocol with the goal of mitigating the interference of black hole nodes while routing in mobile ad-hoc networks. The overall performance of the network is negatively impacted when there are black hole nodes in the route that routing takes. As a result, we have developed a routing protocol that reduces the likelihood that packets would be lost because of black hole nodes. This routing system has been subjected to experimental testing to guarantee that the most secure path will be selected for the delivery of packets between a source and a destination. The invasion of wormholes into wireless networks results in the segmentation of the network as well as a disorder in the routing. As a result, we provide an effective approach for locating wormholes by using ordinal multi-dimensional scaling and round-trip duration in wireless ad hoc networks with either sparse or dense topologies. Wormholes that are linked by both short-route and long-path wormhole linkages may be found using the approach that was given. To guarantee that this ad hoc network does not include any wormholes that go unnoticed, this method is subjected to experimental testing. To fight against selective forwarding attacks in wireless ad-hoc networks, we have developed three different techniques. The first method is an incentive-based algorithm that makes use of a reward-punishment system to drive cooperation among three nodes for forwarding messages in crowded ad-hoc networks. A unique adversarial model has been developed by our team, and inside it, three distinct types of nodes and the activities they participate in are specified. We have demonstrated that the proposed method that is based on incentives prevents nodes from adopting individualistic behaviour, which ensures cooperation in the process of packet forwarding. In the second algorithm, a game theoretic model is proposed that uses non-cooperative game theory to ensure that intermediate nodes in resource-constrained ad-hoc networks faithfully forward packets.

    Keywords :

    Incentive-based algorithm , intermediate nodes , Adhoc networks , forward packets

    References

    [1] Sharma, A., and N. Kumar (2013). Trust Based Theoretical Framework for Mobile AdHoc

    Networks, International Journal of Advanced Research in Computer Science and Software Engineering,

    Vol. 3, No. 6, pp. 905-909.

    [2] Balakrishnan, V., V. Varadharajan, U. K. Tupakula and P. Lucs (2007). Trust and

    recommendations in mobile ad hoc networks, in Proc. 3rd International Conference on Networking and

    Services, pp. 64–69.

    [3] Buchegger, S., and J.Y. L. Boudec (2002), Performance Analysis of the CONFIDANT Protocol, in

    Proc. 3rd ACM international symposium. Mobile Ad Hoc Network. Computing, pp 226–236.

    [4] Chen, H., and Z. Ye (2008). Research of P2P Trust based on Fuzzy Decision-making, International

    Conference on Computer Supported Cooperative Work in Design, pp. 793-796. England,

    [5] P., Q. Shi, B. Askwith, Bouhafs (2012). A Survey Of Trust Management In Mobile Ad-Hoc

    Networks, Proceedings of the 13th Annual PostGraduate Symposium on The Convergence of

    Telecommunications, Networking, and Broadcasting.

    [6] Eschenauer, L., V. D. Gligor, and J. Baras (2002). On Trust Establishment in Mobile Ad Hoc

    Networks, Proc. 10th I t’l Security Protocols Workshop, Vol. 2845, pp. 47-66.

    [7] De Rango, F., (2009). Improving SAODV Protocol with Trust levels management, IDM and

    Incentive Cooperation in MANET, Proceedings of the Conference on Wireless Telecommunications

    Symposium, pp. 352-359.

    [8] Qin, F., and Y. Liu (2009). Multipath Routing for Mobile Ad Hoc Network, Proceedings of

    International Symposium on Information Processing, pp 237-240.

    [9] Geetha, S., and G. Geetha Ramani (2014). Survey of Trust-Based Routing Protocols in MANET,

    International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No.

    10, pp. 604-608.

    [10] Ghorpade, V.,R.,(2008). Fuzzy Logic based Trust Management Framework for MANET, DSP

    Journal, Vol 8, No. 1.

    [11] Ghorpade, V., R.,Y. V. Joshi and R. R. Manthalkar (2014). Fuzzy Logic based Trust Management

    Framework for MANET, Journal of Shivaji University (Science & Technology), Vol. 41, No. 1, pp 83-98.

    [12] Griffiths, N., K.M. Chao, and M. Younas (2006). Fuzzy trust for peer-to-peer systems, IEEE

    International Conference on Distributed Computing Systems Workshops, pp. 73-73.

    [13] Hallani, H., and A.Hellany (2009). Wireless Ad-hoc Networks: Using Fuzzy Trust Approach to

    Improve Security between Nodes, In International Conference on Computer Engineering & System, pp.

    359-365.

    [14] He, Q., D. Wu, and P. Khosla (2004). SORI: A secure and objective reputation-based incentive

    scheme for ad-hoc networks, in Proc. IEEE Wireless Communications and Networking Conference, pp.

    825–830.

    [15] Ho, J., W. (2009). Zone-based trust management in sensor networks, IEEE International Conference

    on Pervasive Computing and Communications, pp. 1–2.

    [16] Chen, R., J. Guo, F. Bao and J.H. Cho (2014). Trust management in mobile ad hoc networks for bias

    minimization and application performance maximization. Ad Hoc Networks, Vol. 19, pp 59-74.

    [17] Woungang, I., M. S. Obaidat, S. K. Dhurandher, H. C. Chao and C. Li (2012). TrustEnhanced

    Message Security Protocol for Mobile Ad Hoc Networks, IEEE International Conference on

    Communications, pp 988–992.

    [18] Sen, J., (2010). A Distributed Trust Management Framework For Detecting Malicious Packet

    Dropping Nodes In A Mobile Ad Hoc Network, International Journal of Network Security & Its

    Applications, Vol. 2, No. 4, pp 92-104.

    [19] Jiang., J and J. S. Baras (2006). Trust evaluation in anarchy: A case study of autonomous networks,

    IEEE International Conference on Computer Communications, pp. 1–12.

    [20] Cho, J. H., and R. Chen (2013). On the tradeoff between altruism and selfishness in MANET trust

    management, Ad Hoc Networks, Elsevier B.V, Vol. 11, No. 8, pp. 2217– 2234.

    [21] Josang, A., R. Ismail and C. Boyd (2007). A survey of trust and reputation systems for online

    service provision, Decision support systems, Vol. 43, pp. 618-644.

    Cite This Article As :
    Lamia F. Tulaib, Akbal O. Salman, Mazin A. Mohammed. "Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks." Full Length Article, Vol. 3, No. 1, 2021 ,PP. 49-58 (Doi   :  https://doi.org/10.54216/IJWAC.030105)
    Lamia F. Tulaib, Akbal O. Salman, Mazin A. Mohammed. (2021). Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks. Journal of , 3 ( 1 ), 49-58 (Doi   :  https://doi.org/10.54216/IJWAC.030105)
    Lamia F. Tulaib, Akbal O. Salman, Mazin A. Mohammed. "Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks." Journal of , 3 no. 1 (2021): 49-58 (Doi   :  https://doi.org/10.54216/IJWAC.030105)
    Lamia F. Tulaib, Akbal O. Salman, Mazin A. Mohammed. (2021). Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks. Journal of , 3 ( 1 ), 49-58 (Doi   :  https://doi.org/10.54216/IJWAC.030105)
    Lamia F. Tulaib, Akbal O. Salman, Mazin A. Mohammed. Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks. Journal of , (2021); 3 ( 1 ): 49-58 (Doi   :  https://doi.org/10.54216/IJWAC.030105)
    Lamia F. Tulaib, Akbal O. Salman, Mazin A. Mohammed, Innovative Techniques for Attack Detection in Wireless Ad-Hoc Networks, Journal of , Vol. 3 , No. 1 , (2021) : 49-58 (Doi   :  https://doi.org/10.54216/IJWAC.030105)