Abstract
Mobile ad hoc network is open medium, infrastructure-less and easy to install. Despite these features, mobile ad hoc network is vulnerable to various security attacks. Black hole and gray hole security attacks outrank among all security attacks. This paper proposes a distributed delegation-based scheme, namely, a secure path selection scheme. The proposed scheme identifies and allows only trusted nodes to become part of active path. The simulation results revealed that proposed scheme improved the packet delivery ratio, packet loss rate, throughput by 8% and routing overhead by 5% as compared to other system.
Similar content being viewed by others
References
Alkhamisi, A. O., & Buhari, S. M. (2016). Trusted secure adhoc on-demand multipath distance vector routing in MANET. In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 212–219.
Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Modified AODV routing protocol to improve security and performance against black hole attack. In 2016 IEEE International Conference on Information Technology for Organizations Development (IT4OD), pp. 1–7.
Khatawkar, S. D., & Trivedi, N. (2015). Detection of gray hole in MANET through cluster analysis. In 2015 IEEE 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1752–1757.
Babu, M. R., Dian, S. M., Chelladurai, S., & Palaniappan, M. (2015). Proactive alleviation procedure to handle black hole attack and its version. The Scientific World Journal, 2015. doi:10.1155/2015/715820.
Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.
Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505–1511.
Shabut, A. M., Dahal, K. P., Bista, S. K., & Awan, I. U. (2015). Recommendation based trust model with an effective defence scheme for MANETs. IEEE Transactions on Mobile Computing, 14(10), 2101–2115.
Soleimani, M. T., & Kahvand, M. (2014). Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks. In IEEE 17th Mediterranean Electrotechnical Conference (MELECON), pp. 362–366.
Kavitha, P., & Mukesh, R. (2015). To detect malicious nodes in the mobile ad-hoc networks using soft computing technique. In IEEE 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 1564–1573.
Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 21(8), 2781–2798.
Hidoussi, F., Toral-Cruz, H., Boubiche, D. E., Lakhtaria, K., Mihovska, A., & Voznak, M. (2015). Centralized IDS based on misuse detection for cluster-based wireless sensors networks. Wireless Personal Communications, 85(1), 207–224.
Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83.
Savner, J., & Gupta, V. (2014). Clustering of mobile ad hoc networks: An approach for black hole prevention. In International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.
Thorat, S. A., & Kulkarni, P. J. (2014). Design issues in trust based routing for MANET. In IEEE International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7.
Abdelshafy, M. A., & King, P. J. (2016). Resisting blackhole attacks on MANETs. In IEEE 13th Conference on Annual Consumer Communications & Networking (CCNC), pp. 1048–1053.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In ACM Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265.
Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.
Sheltami, T., Al-Roubaiey, A., Shakshuki, E., & Mahmoud, A. (2009). Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Systems, 15(5), 273–282.
Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK a secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.
Kumar, J. M. S. P. J., Kathirvel, A., Kirubakaran, N., Sivaraman, P., & Subramaniam, M. (2015). A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP Journal on Wireless Communications and Networking, 2015(1), 1–11.
Aware, A. A., & Bhandari, K. (2014). Prevention of black hole attack on AODV in MANET using hash function. In IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), pp. 1–6.
Raja, K., Deivasigamani, A., & Ravi, V. (2016). A reliant certificate revocation of malicious nodes in MANETs. Wireless Personal Communications, 90(2), 435–455.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Ubarhande, S.D., Doye, D.D. & Nalwade, P.S. A Secure Path Selection Scheme for Mobile Ad Hoc Network. Wireless Pers Commun 97, 2087–2096 (2017). https://doi.org/10.1007/s11277-017-4597-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-017-4597-1