DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks
Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastr...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2024-02, Vol.134 (3), p.1469-1490 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1490 |
---|---|
container_issue | 3 |
container_start_page | 1469 |
container_title | Wireless personal communications |
container_volume | 134 |
creator | Mankotia, Vivek Sunkaria, Ramesh Kumar Gurung, Shashi |
description | Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics. |
doi_str_mv | 10.1007/s11277-024-10956-0 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3043876481</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3043876481</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</originalsourceid><addsrcrecordid>eNp9kLtOAzEQRS0EEuHxA1SWqA1jr_dFtySEIPEqgkRnef0gC5t1sB0hGr4dhyDRUU0x99wZHYROKJxRgPI8UMrKkgDjhEKdFwR20IjmJSNVxp930QhqVpOCUbaPDkJ4BUhYzUboazJv7i5wgyefg1x2Cs8X3oSF6zWWg8Z3buii893wgi9lMBrPjVoM3fva4Ojwo3fRqJhSbdcb3GiycArfm_jh_Bu23i3xZS_VG5m5tN70TXvn9KatiTEtwhHas7IP5vh3HqKn6dV8PCO3D9c34-aWqIzWkRTKak6rSmdcF7UpgEpb29bYHLiuS53bogUFzOTUclvw3EplqGx5XkGryzw7RKfb3pV36fkQxatb-yGdFBnwrCoLXtGUYtuU8i4Eb6xY-W4p_aegIDaexdazSJ7Fj2cBCcq2UFhtPBn_V_0P9Q2lXYCg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3043876481</pqid></control><display><type>article</type><title>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</title><source>SpringerLink_现刊</source><creator>Mankotia, Vivek ; Sunkaria, Ramesh Kumar ; Gurung, Shashi</creator><creatorcontrib>Mankotia, Vivek ; Sunkaria, Ramesh Kumar ; Gurung, Shashi</creatorcontrib><description>Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-024-10956-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Communications traffic ; Computer Communication Networks ; Denial of service attacks ; Engineering ; Mobile ad hoc networks ; Monitoring ; Networks ; Nodes ; Packets (communication) ; Performance degradation ; Performance evaluation ; Performance measurement ; Routing (telecommunications) ; Shortest-path problems ; Signal,Image and Speech Processing ; Wireless networks</subject><ispartof>Wireless personal communications, 2024-02, Vol.134 (3), p.1469-1490</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</citedby><cites>FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</cites><orcidid>0000-0002-9745-8266 ; 0000-0002-0903-6486</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-024-10956-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-024-10956-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Mankotia, Vivek</creatorcontrib><creatorcontrib>Sunkaria, Ramesh Kumar</creatorcontrib><creatorcontrib>Gurung, Shashi</creatorcontrib><title>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.</description><subject>Communications Engineering</subject><subject>Communications traffic</subject><subject>Computer Communication Networks</subject><subject>Denial of service attacks</subject><subject>Engineering</subject><subject>Mobile ad hoc networks</subject><subject>Monitoring</subject><subject>Networks</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Performance degradation</subject><subject>Performance evaluation</subject><subject>Performance measurement</subject><subject>Routing (telecommunications)</subject><subject>Shortest-path problems</subject><subject>Signal,Image and Speech Processing</subject><subject>Wireless networks</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kLtOAzEQRS0EEuHxA1SWqA1jr_dFtySEIPEqgkRnef0gC5t1sB0hGr4dhyDRUU0x99wZHYROKJxRgPI8UMrKkgDjhEKdFwR20IjmJSNVxp930QhqVpOCUbaPDkJ4BUhYzUboazJv7i5wgyefg1x2Cs8X3oSF6zWWg8Z3buii893wgi9lMBrPjVoM3fva4Ojwo3fRqJhSbdcb3GiycArfm_jh_Bu23i3xZS_VG5m5tN70TXvn9KatiTEtwhHas7IP5vh3HqKn6dV8PCO3D9c34-aWqIzWkRTKak6rSmdcF7UpgEpb29bYHLiuS53bogUFzOTUclvw3EplqGx5XkGryzw7RKfb3pV36fkQxatb-yGdFBnwrCoLXtGUYtuU8i4Eb6xY-W4p_aegIDaexdazSJ7Fj2cBCcq2UFhtPBn_V_0P9Q2lXYCg</recordid><startdate>20240201</startdate><enddate>20240201</enddate><creator>Mankotia, Vivek</creator><creator>Sunkaria, Ramesh Kumar</creator><creator>Gurung, Shashi</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9745-8266</orcidid><orcidid>https://orcid.org/0000-0002-0903-6486</orcidid></search><sort><creationdate>20240201</creationdate><title>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</title><author>Mankotia, Vivek ; Sunkaria, Ramesh Kumar ; Gurung, Shashi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Communications Engineering</topic><topic>Communications traffic</topic><topic>Computer Communication Networks</topic><topic>Denial of service attacks</topic><topic>Engineering</topic><topic>Mobile ad hoc networks</topic><topic>Monitoring</topic><topic>Networks</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Performance degradation</topic><topic>Performance evaluation</topic><topic>Performance measurement</topic><topic>Routing (telecommunications)</topic><topic>Shortest-path problems</topic><topic>Signal,Image and Speech Processing</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mankotia, Vivek</creatorcontrib><creatorcontrib>Sunkaria, Ramesh Kumar</creatorcontrib><creatorcontrib>Gurung, Shashi</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mankotia, Vivek</au><au>Sunkaria, Ramesh Kumar</au><au>Gurung, Shashi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2024-02-01</date><risdate>2024</risdate><volume>134</volume><issue>3</issue><spage>1469</spage><epage>1490</epage><pages>1469-1490</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-024-10956-0</doi><tpages>22</tpages><orcidid>https://orcid.org/0000-0002-9745-8266</orcidid><orcidid>https://orcid.org/0000-0002-0903-6486</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0929-6212 |
ispartof | Wireless personal communications, 2024-02, Vol.134 (3), p.1469-1490 |
issn | 0929-6212 1572-834X |
language | eng |
recordid | cdi_proquest_journals_3043876481 |
source | SpringerLink_现刊 |
subjects | Communications Engineering Communications traffic Computer Communication Networks Denial of service attacks Engineering Mobile ad hoc networks Monitoring Networks Nodes Packets (communication) Performance degradation Performance evaluation Performance measurement Routing (telecommunications) Shortest-path problems Signal,Image and Speech Processing Wireless networks |
title | DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T08%3A51%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DTAM:%20A%20Dynamic%20Threshold%20and%20Monitoring%20Based%20Technique%20to%20Protect%20Mobile%20Ad-hoc%20Network%20from%20Black-Hole%20and%20Flooding%20Attacks&rft.jtitle=Wireless%20personal%20communications&rft.au=Mankotia,%20Vivek&rft.date=2024-02-01&rft.volume=134&rft.issue=3&rft.spage=1469&rft.epage=1490&rft.pages=1469-1490&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-024-10956-0&rft_dat=%3Cproquest_cross%3E3043876481%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3043876481&rft_id=info:pmid/&rfr_iscdi=true |