EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks
Abstract
:1. Introduction
- Propose TR algorithm utilizing TTL and RTT;
- Propose EBR protocol based on TR algorithm. EBR enhances the network performance. EBR is able to do the following main functions:
- ➢
- Detect blackhole attacker(s) in a transmission route,
- ➢
- Detect data congestion at intermediate nodes in a transmission route;
- Filter out routes returned by AOMDV to avoid blackhole attackers and congested nodes;
- Compare our EBR protocol with other comparative methods through simulation.
2. Related Work
3. Proposed Protocol
3.1. Problem Statement
3.2. Proposed Solution
3.3. Methodology
- Route Request Tests: Each node in the network periodically sends a Test_RREQ message to a dummy destination node. The time to live (TTL) of the Test_RREQ message has an arbitrary value n. Enlarging n would increase the number of nodes to be examined and, therefore, the source node will have a better idea of those malicious nodes in a certain path. However, this large n would create extra overhead traffic in the network that should be avoided. On the other hand, it would be more precious that each node just examine the suspicious nodes in its close neighborhood, so it is ideal to have the value of n <=3;
- Route Response: Only a maleficent node will respond to this Test_RREQ message. If the source node receives an RREP to its Test_RREQ from one of its neighbors, the source can confirm that the current route has blackhole node(s) and changes its trust level;
- Trust Levels: We have two types of trust levels: TRUST and THREAT, as shown in Algorithm 1. When a new node joins the network, its trust level is set to TRUST as a good node and, therefore, its confidence is set to +1. When any node responds to the Test_RREQ message, then its trust level is updated to THREAT. In this case, the procedures in Algorithm 2 should be followed;
- Confidence Levels: If the node is set as a THREAT, we have two further types of confidence levels: negative and zero. When a node thinks its neighbor is a blackhole node, then it gives that particular node −1 confidence. However, if the neighbor is thought to be a victim of a blackhole node, the confidence of that node becomes zero;
- Node Integrity Test: In case of a THREAT node, we test if a neighboring node is a malignant or a victim node. In doing this, we use our TR mechanism with different possibilities listed below. The TR mechanism includes both Algorithms 1 and 2. RTTi and RTTa stand for instant and average RTT, respectively. TTL can have the value n.
- When and TTL value is small: In this case, we can locate exactly the position of the blackhole node(s) using the RREP message. The blackhole node is the neighboring node if n = 1. If n = 2, the neighboring node is given the confidence of zero, as it is most likely a victim of a blackhole node next to it. Increasing n would refer to more potential nodes that act falsely in the current route;
- When and TTL value is large: In this case, the source node can recognize that there is a possibility of having blackhole node(s) in the path, and it is far away from the source node depending on the value of n. However, the location of the blackhole node(s) cannot be determined exactly. This path should be avoided in routing the data packets. The confidence level of the neighboring node is not changed. In addition, the neighboring node is not congested and, therefore, it can be used safely in other paths;
- When and TTL value is small: This can locate the blackhole node(s) in a specific route, but most likely it is not the neighboring node(s). In other words, the attacker node(s) is farther away from the source node and responds late because one or more of the preceding nodes, in a specific path, is congested. Therefore, the source node can recognize that the neighboring node(s) are likely congested and the farther node(s) is/are blackhole node(s). However, the neighboring node can be considered in any other route, as it is congested but safe. This only can be accepted if other paths are suspicious as they go through one of the blackhole attackers;
- When and TTL value is large: Location of the blackhole attacker is somewhere away from the source node. RTTi is large because of having several congested nodes or due to the large value of n. Therefore, the whole path should be avoided.
- Data Communications: As shown in Algorithm 3, EBR is a combination of a reactive routing protocol and our TR algorithm. Selected routes should consider the confidence values calculated using our TR method during the testing phase. When the source node wants to communicate, it will only consider the routes which have positive confidence levels and, also, are less congested. Zero confidence indicates that a node has a blackhole attacker next to it. Negative confidence indicates that this is a blackhole node.
3.4. EBR Routes Properties
Algorithm 1: Test Neighbor Integrity |
1. Begin |
2. Input n |
3. When a node joins the network |
5. Status = TRUST |
6. Confidence = +1 |
7. Broadcast Test_RREQ to neighboring nodes with TTL = n |
8. If (RREP = 0) |
9. Then |
10. No blackhole node exists |
11. Status = No_Change |
12. Confidence (all the neighboring nodes) = No_Change |
13. Else |
14. Blackhole node(s) exist |
15. Status (RREP Route) = Threat |
15. Confidence (nodes that sent RREP) = X |
16. Test threat Route (Algorithm 2) |
17. End if |
Algorithm 2: Test Threat Route |
Begin |
k is the total number of successful transactions till the current data transmission instant. |
Procedure 1: |
1. (instant RTT of the route we are testing) |
2. |
4. If () |
5. Then |
6. Examine RREP for r = 1, 2, …, n |
7. Switch (r) |
8. case (1) !if RREP returns from neighboring node |
9. This is a blackhole node, |
10. Confidence (node) = −1 |
11. case (2) !if RREP returns from not neighboring node(s) |
12. Neighboring node might be victim of a blackhole node, |
13. Confidence (nodes in the current path) = 0 |
14. Default !r ≥ 3 |
15. Suspected node is far from the testing node, and its confidence = −1 |
16. Confidence (remaining nodes in the path) = No_Change |
17. End switch case |
18. Else |
19. Suspected node is far from the testing node, and its confidence = −1 |
20. Confidence (remaining nodes in the path) = No_Change, |
21. Congestion at the nodes of the current path likely exists. |
22. End If |
Algorithm 3: Route Selection |
Begin |
1. Broadcast RREQ |
2. Sort received routes from AOMDV based on their minimum RTT in ascending order in an array A |
3. While (RREP = true) |
4. If Confidence (nodes in the RREPs) > 0 |
5. Then |
6. Send the data packets through the route with the minimum RTT in array A |
7. Else If Confidence (nodes in the RREPs) = 0 |
8. Send the data packets through the route with the minimum RTT in array A |
9. Else |
10. Terminate the process |
11. End if |
4. Results and Evaluation
4.1. Performance Metrics
4.2. Simulation Evaluation
5. Protocol Complexity
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Ghosh, U.; Datta, R. A Secure Addressing Scheme for Large-Scale Managed MANETs. IEEE Trans. Netw. Serv. Manag. 2015, 12, 483–495. [Google Scholar] [CrossRef]
- Siraj, M.; Ahmed, Z.; Hanif, M.; Chaudary, M.; Khan, S.; Javaid, N. A Hybrid Routing Protocol for Wireless Distributed Networks. IEEE Access 2018, 6, 67244–67260. [Google Scholar] [CrossRef]
- Marina, M.K.; Das, S.R. On-demand multipath distance vector routing in ad hoc networks. In Proceedings of the 9th International Conference on Network Protocols (ICNP. 2001.), Riverside, CA, USA, 11–14 November 2001; pp. 14–23. [Google Scholar]
- Jhaveri, R.; Patel, S.; Jinwala, D. DoS attacks in mobile ad-hoc networks: A survey. In Proceedings of the IEEE 2nd international conference on advanced computing & communication technologies, Haryana, India, 7–8 January 2012. [Google Scholar]
- Gurung, S.; Chauhan, S. Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET. Wirel. Netw. 2019, 25, 975–988. [Google Scholar] [CrossRef]
- Adil, M.; Khan, R.; Almaiah, M.A.; Al-Zahrani, M.; Zakarya, M.; Amjad, M.S.; Ahmed, R. MAC-AODV Based Mutual Authentication Scheme for Constraint Oriented Networks. IEEE Access 2020, 8, 44459–44469. [Google Scholar] [CrossRef]
- Kuo, W.; Chu, S. Energy Efficiency Optimization for Mobile Ad Hoc Networks. IEEE Access 2016, 4, 928–940. [Google Scholar] [CrossRef]
- Gurung, S.; Chauhan, S. A dynamic threshold-based approach for mitigating black-hole attack in MANET. Wirel. Netw. 2018, 24, 2957–2971. [Google Scholar] [CrossRef]
- Gurung, S.; Chauhan, S. A survey of black-hole attack mitigation techniques in MANET: Merits, drawbacks, and suitability. Wirel. Netw. 2020, 26, 1981–2011. [Google Scholar] [CrossRef]
- Marchang, N.; Datta, R. Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf. Secur. 2012, 6, 77–83. [Google Scholar] [CrossRef]
- Abusalah, L.; Khokhar, A.; Guizani, M. A survey of secure mobile Ad Hoc routing protocols. IEEE Commun. Surv. Tutor. 2008, 10, 78–93. [Google Scholar] [CrossRef]
- Wang, X.; Zhang, P.; Du, Y.; Qi, M. Trust Routing Protocol Based on Cloud-Based Fuzzy Petri Net and Trust Entropyfor Mobile Ad hoc Network. IEEE Access 2020, 8, 47675–47693. [Google Scholar] [CrossRef]
- Shabut, A.; Dahal, K.; Bista, S.; Awan, I. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs. IEEE Trans. Mob. Comput. 2015, 14, 2101–2115. [Google Scholar] [CrossRef] [Green Version]
- Liu, W.; Yu, M. Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments. IEEE Trans. Veh. Technol. 2014, 63, 4585–4593. [Google Scholar] [CrossRef]
- Wang, L.; Lehman, V.; Hoque, A.; Zhang, B.; Yu, Y.; Zhang, L. A Secure Link State Routing Protocol for NDN. IEEE Access 2017, 6, 10470–10482. [Google Scholar] [CrossRef]
- Abdelshafy, M.; King, P. AODV and SAODV under attack: Performance comparison. In Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2014. Lecture Notes in Computer Science; Guo, S., Lloret, J., Manzoni, P., Ruehrup, S., Eds.; Springer: Cham, Switzerland, 2014; Volume 8487. [Google Scholar]
- Abdelshafy, M.; King, P. Resisting Blackhole Attacks on MANETs. In Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 9–12 January 2016. [Google Scholar]
- Orallo, E.; Serrat, M.; Cano, J.; Calafate, C.; Manzoni, P. Improving Selfish Node Detection in MANETs Using a Collaborative Watchdog. IEEE Commun. Lett. 2012, 16, 642–645. [Google Scholar] [CrossRef] [Green Version]
- Shakshuki, E.M.; Kang, N.; Sheltami, T.R. EAACK—A Secure Intrusion-Detection System for MANETs. IEEE Trans. Ind. Electron. 2013, 60, 1089–1098. [Google Scholar] [CrossRef]
- El-Semary, A.; Diab, H. BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map. IEEE Access 2019, 7, 95197–95211. [Google Scholar] [CrossRef]
- Ochola, E.; Mejaele, L.; Eloff, M.; Poll, J. Manet reactive routing protocols node mobility variation effect in analysing the impact of black hole attack. SAIEE Afr. Res. J. 2017, 108, 80–92. [Google Scholar] [CrossRef] [Green Version]
- Jain, A.K.; Choorasiya, A. Security enhancement of AODV routing protocol in mobile ad hoc network. In Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES), Coimbatore, India, 19–20 October 2017; pp. 958–964. [Google Scholar]
- Poongodi, T.; Khan, M.; Patan, R.; Gandomi, A.; Balusamy, B. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks. IEEE Access 2019, 7, 18409–18419. [Google Scholar] [CrossRef]
- Dokurer, S.; Erten, Y.M.; Acar, C.E. Performance analysis of adhoc networks under blackhole attacks. Proceedings IEEE SoutheastCon; 2007; pp. 148–153. [Google Scholar]
- Dhende, S.; Musale, S.; Najan, S.A. SAODV: Black hole and gray hole attack detection protocol in MANETs. In Proceedings of the International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, 22–24 March 2017. [Google Scholar]
- Chang, J.; Tsou, P.; Woungang, I.; Chao, H.; Lai, C. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. IEEE Syst. J. 2015, 9, 65–75. [Google Scholar] [CrossRef]
- Hurley-Smith, D.; Wetherall, J.; Adekunle, A. SUPERMAN: Security Using Pre-Existing Routing for Mobile Ad hoc Networks. IEEE Trans. Mob. Comput. 2017, 16, 2927–2940. [Google Scholar] [CrossRef]
- Cai, R.; Li, X.; Chong, P. An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs. IEEE Trans. Mob. Comput. 2019, 18, 42–55. [Google Scholar] [CrossRef]
- Hammamouche, A.; Omar, M.; Djebari, N.; Tari, A. Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET. J. Inf. Secur. Appl. 2018, 43, 12–20. [Google Scholar] [CrossRef]
- Debarati, R.C.; Leena, R.; Nilesh, M. Implementing and improving the performance of AODV by receive reply method and securing it from black hole attack. Procedia Comput. Sci. 2015, 45, 564–570. [Google Scholar]
- Chavan, A.A.; Kurule, D.S.; Dere, P.U. Performance analysis of AODV and DSDV routing protocol in MANET and modifications in AODV against black hole attack. Procedia Comput. Sci. 2016, 79, 835–844. [Google Scholar] [CrossRef] [Green Version]
- Deshmukh, S.R.; Chatur, P.N.; Bhople, N.B. AODV-based secure routing against blackhole attack in MANET. In Proceedings of the International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), Bengaluru, India, 20–21 May 2016; pp. 1960–1964. [Google Scholar]
- Yasin, A.; Zant, M.A. Detecting and isolating black-hole attacks in MANET using timer based baited technique. Wirel. Commun. Mobile Comput. 2018, 2018, 9812135. [Google Scholar] [CrossRef] [Green Version]
- Li, T.; Ma, J.; Pei, Q.; Song, H.; Shen, Y.; Sun, C. DAPV: Diagnosing Anomalies in MANETs Routing with Provenance and verification. IEEE Access 2018, 7, 35302–35316. [Google Scholar] [CrossRef]
- Pham, T.N.D.; Yeo, C.K. Detecting Colluding Blackhole and Greyhole Attacks in Delay Tolerant Networks. IEEE Trans. Mob. Comput. 2016, 15, 1116–1129. [Google Scholar] [CrossRef]
- Tsiropoulou, E.E.; Katsinis, G.K.; Papavassiliou, S. Utility-based Power Control via Convex Pricing for the Uplink in CDMA Wireless Networks. In Proceedings of the European Wireless Conference, Lucca, Italy, 12–15 April 2010. [Google Scholar]
- Li, J.; Gong, E.; Sun, Z.; Xie, H. QoS-Based Rate Control Scheme for Non-Elastic Traffics in Distributed Networks. IEEE Commun. Lett. 2015, 19, 1037–1040. [Google Scholar] [CrossRef]
- Wang, Z.; Zeng, X.; Liu, X.; Xu, M.; Wen, Y.; Chen, L. TCP congestion control algorithm for heterogeneous Internet. J. Netw. Comput. Appl. 2016, 68, 56–64. [Google Scholar] [CrossRef]
- Akhtar, N.; Khan, M.; Ullah, A.; Javed, M. Congestion Avoidance for Smart Devices by Caching Information in MANETS and IoT. IEEE Access 2019, 7, 71459–71471. [Google Scholar] [CrossRef]
- Benyahia, A.; Bilami, A.; Sedrati, M. CARTEE: Congestion avoidance with reliable transport and energy efficiency for multimedia applications in wireless sensor networks. Wirel. Netw. 2020, 26, 1803–1822. [Google Scholar] [CrossRef]
- Al Islam, A.; Raghunathan, V. iTCP: An intelligent TCP with neural network based end-to-end congestion control for ad-hoc multi-hop wireless mesh networks. Wirel. Netw. 2015, 21, 581–610. [Google Scholar] [CrossRef]
- Robinson, H.; Julie, E.; Saravanan, K.; Son, R.; Kumar, M.; Abdel-Basset, P. Thong Link-Disjoint Multipath Routing for Network Traffic Overload Handling in Mobile Ad-hoc Networks. IEEE Access 2019, 7, 143312–143323. [Google Scholar] [CrossRef]
- Mirkovic, D.; Armitage, G.; Branch, P. A Survey of Round Trip Time Prediction Systems. IEEE Commun. Surv. Tutor. 2018, 20, 1758–1776. [Google Scholar] [CrossRef]
- Du, W.; Liao, Y.; Tao, N.; Geurts, P.; Fu, X.; Leduc, G. Rating Network Paths for Locality-Aware Overlay Construction and Routing. IEEE/ACM Trans. Netw. 2015, 23, 1661–1673. [Google Scholar] [CrossRef] [Green Version]
- Chen, Z.; Zhou, W.; Wu, S.; Cheng, L. An adaptive on-demand multipath routing protocol with QoS support for high-speed MANET. IEEE Access 2020, 8, 44760–44773. [Google Scholar] [CrossRef]
- Taha, A.; Alsaqour, R.; Uddin, M.; Abdelhaq, M.; Saba, T. Energy efficient multipath routing protocol for mobile ad-hoc network using thefitness function. IEEE Access 2017, 5, 10369–10381. [Google Scholar] [CrossRef]
- Muneeswari, B.; Manikandan, M.S.K. Energy efficient clustering andsecure routing using reinforcement learning for three-dimensional mobile ad hoc networks. IET Commun. 2019, 13, 1828–1839. [Google Scholar] [CrossRef]
- Tian, Y.; Xu, K.; Ansari, N. TCP in Wireless Environments: Problems and Solutions. IEEE Radio Commun. 2005, 43, 527–532. [Google Scholar]
- Chakeres, D.; Belding-Royer, E.M. AODV routing protocol implementation design. In Proceedings of the 24th International Conference on Distributed Computing Systems, Tokyo, Japan, 24–26 March 2004; pp. 698–703. [Google Scholar]
Parameters | Values |
---|---|
Number of Nodes | 100 |
Mobility Speed | 10 m/s |
Mobility | Random Way point Model |
Propagation model | Free space propagation model |
Area | 500 m × 500 m |
Blackhole nodes | 10% |
MAC Type | 802.11 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kancharakuntla, D.; El-Ocla, H. EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks. Electronics 2022, 11, 3480. https://doi.org/10.3390/electronics11213480
Kancharakuntla D, El-Ocla H. EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks. Electronics. 2022; 11(21):3480. https://doi.org/10.3390/electronics11213480
Chicago/Turabian StyleKancharakuntla, Deepika, and Hosam El-Ocla. 2022. "EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks" Electronics 11, no. 21: 3480. https://doi.org/10.3390/electronics11213480
APA StyleKancharakuntla, D., & El-Ocla, H. (2022). EBR: Routing Protocol to Detect Blackhole Attacks in Mobile Ad Hoc Networks. Electronics, 11(21), 3480. https://doi.org/10.3390/electronics11213480