Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

A Secure Path Selection Scheme for Mobile Ad Hoc Network

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Mobile ad hoc network is open medium, infrastructure-less and easy to install. Despite these features, mobile ad hoc network is vulnerable to various security attacks. Black hole and gray hole security attacks outrank among all security attacks. This paper proposes a distributed delegation-based scheme, namely, a secure path selection scheme. The proposed scheme identifies and allows only trusted nodes to become part of active path. The simulation results revealed that proposed scheme improved the packet delivery ratio, packet loss rate, throughput by 8% and routing overhead by 5% as compared to other system.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Alkhamisi, A. O., & Buhari, S. M. (2016). Trusted secure adhoc on-demand multipath distance vector routing in MANET. In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA), pp. 212–219.

  2. Moudni, H., Er-rouidi, M., Mouncif, H., & El Hadadi, B. (2016). Modified AODV routing protocol to improve security and performance against black hole attack. In 2016 IEEE International Conference on Information Technology for Organizations Development (IT4OD), pp. 1–7.

  3. Khatawkar, S. D., & Trivedi, N. (2015). Detection of gray hole in MANET through cluster analysis. In 2015 IEEE 2nd International Conference on Computing for Sustainable Global Development (INDIACom), pp. 1752–1757.

  4. Babu, M. R., Dian, S. M., Chelladurai, S., & Palaniappan, M. (2015). Proactive alleviation procedure to handle black hole attack and its version. The Scientific World Journal, 2015. doi:10.1155/2015/715820.

  5. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9(1), 65–75.

    Article  Google Scholar 

  6. Shahabi, S., Ghazvini, M., & Bakhtiarian, M. (2016). A modified algorithm to improve security and performance of AODV protocol against black hole attack. Wireless Networks, 22(5), 1505–1511.

    Article  Google Scholar 

  7. Shabut, A. M., Dahal, K. P., Bista, S. K., & Awan, I. U. (2015). Recommendation based trust model with an effective defence scheme for MANETs. IEEE Transactions on Mobile Computing, 14(10), 2101–2115.

    Article  Google Scholar 

  8. Soleimani, M. T., & Kahvand, M. (2014). Defending packet dropping attacks based on dynamic trust model in wireless ad hoc networks. In IEEE 17th Mediterranean Electrotechnical Conference (MELECON), pp. 362–366.

  9. Kavitha, P., & Mukesh, R. (2015). To detect malicious nodes in the mobile ad-hoc networks using soft computing technique. In IEEE 2nd International Conference on Electronics and Communication Systems (ICECS), pp. 1564–1573.

  10. Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Wireless Networks, 21(8), 2781–2798.

    Article  Google Scholar 

  11. Hidoussi, F., Toral-Cruz, H., Boubiche, D. E., Lakhtaria, K., Mihovska, A., & Voznak, M. (2015). Centralized IDS based on misuse detection for cluster-based wireless sensors networks. Wireless Personal Communications, 85(1), 207–224.

    Article  Google Scholar 

  12. Marchang, N., & Datta, R. (2012). Light-weight trust-based routing protocol for mobile ad hoc networks. IET Information Security, 6(2), 77–83.

    Article  Google Scholar 

  13. Savner, J., & Gupta, V. (2014). Clustering of mobile ad hoc networks: An approach for black hole prevention. In International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).

  14. Nishani, L., & Biba, M. (2016). Machine learning for intrusion detection in MANET: A state-of-the-art survey. Journal of Intelligent Information Systems, 46(2), 391–407.

    Article  Google Scholar 

  15. Thorat, S. A., & Kulkarni, P. J. (2014). Design issues in trust based routing for MANET. In IEEE International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7.

  16. Abdelshafy, M. A., & King, P. J. (2016). Resisting blackhole attacks on MANETs. In IEEE 13th Conference on Annual Consumer Communications & Networking (CCNC), pp. 1048–1053.

  17. Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In ACM Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265.

  18. Liu, K., Deng, J., Varshney, P. K., & Balakrishnan, K. (2007). An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6(5), 536–550.

    Article  Google Scholar 

  19. Sheltami, T., Al-Roubaiey, A., Shakshuki, E., & Mahmoud, A. (2009). Video transmission enhancement in presence of misbehaving nodes in MANETs. Multimedia Systems, 15(5), 273–282.

    Article  Google Scholar 

  20. Shakshuki, E. M., Kang, N., & Sheltami, T. R. (2013). EAACK a secure intrusion-detection system for MANETs. IEEE Transactions on Industrial Electronics, 60(3), 1089–1098.

    Article  Google Scholar 

  21. Kumar, J. M. S. P. J., Kathirvel, A., Kirubakaran, N., Sivaraman, P., & Subramaniam, M. (2015). A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT. EURASIP Journal on Wireless Communications and Networking, 2015(1), 1–11.

    Google Scholar 

  22. Aware, A. A., & Bhandari, K. (2014). Prevention of black hole attack on AODV in MANET using hash function. In IEEE 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), pp. 1–6.

  23. Raja, K., Deivasigamani, A., & Ravi, V. (2016). A reliant certificate revocation of malicious nodes in MANETs. Wireless Personal Communications, 90(2), 435–455.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sachin D. Ubarhande.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ubarhande, S.D., Doye, D.D. & Nalwade, P.S. A Secure Path Selection Scheme for Mobile Ad Hoc Network. Wireless Pers Commun 97, 2087–2096 (2017). https://doi.org/10.1007/s11277-017-4597-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-017-4597-1

Keywords

Navigation