DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks

Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastr...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Wireless personal communications 2024-02, Vol.134 (3), p.1469-1490
Hauptverfasser: Mankotia, Vivek, Sunkaria, Ramesh Kumar, Gurung, Shashi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1490
container_issue 3
container_start_page 1469
container_title Wireless personal communications
container_volume 134
creator Mankotia, Vivek
Sunkaria, Ramesh Kumar
Gurung, Shashi
description Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.
doi_str_mv 10.1007/s11277-024-10956-0
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_3043876481</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3043876481</sourcerecordid><originalsourceid>FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</originalsourceid><addsrcrecordid>eNp9kLtOAzEQRS0EEuHxA1SWqA1jr_dFtySEIPEqgkRnef0gC5t1sB0hGr4dhyDRUU0x99wZHYROKJxRgPI8UMrKkgDjhEKdFwR20IjmJSNVxp930QhqVpOCUbaPDkJ4BUhYzUboazJv7i5wgyefg1x2Cs8X3oSF6zWWg8Z3buii893wgi9lMBrPjVoM3fva4Ojwo3fRqJhSbdcb3GiycArfm_jh_Bu23i3xZS_VG5m5tN70TXvn9KatiTEtwhHas7IP5vh3HqKn6dV8PCO3D9c34-aWqIzWkRTKak6rSmdcF7UpgEpb29bYHLiuS53bogUFzOTUclvw3EplqGx5XkGryzw7RKfb3pV36fkQxatb-yGdFBnwrCoLXtGUYtuU8i4Eb6xY-W4p_aegIDaexdazSJ7Fj2cBCcq2UFhtPBn_V_0P9Q2lXYCg</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3043876481</pqid></control><display><type>article</type><title>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</title><source>SpringerLink_现刊</source><creator>Mankotia, Vivek ; Sunkaria, Ramesh Kumar ; Gurung, Shashi</creator><creatorcontrib>Mankotia, Vivek ; Sunkaria, Ramesh Kumar ; Gurung, Shashi</creatorcontrib><description>Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.</description><identifier>ISSN: 0929-6212</identifier><identifier>EISSN: 1572-834X</identifier><identifier>DOI: 10.1007/s11277-024-10956-0</identifier><language>eng</language><publisher>New York: Springer US</publisher><subject>Communications Engineering ; Communications traffic ; Computer Communication Networks ; Denial of service attacks ; Engineering ; Mobile ad hoc networks ; Monitoring ; Networks ; Nodes ; Packets (communication) ; Performance degradation ; Performance evaluation ; Performance measurement ; Routing (telecommunications) ; Shortest-path problems ; Signal,Image and Speech Processing ; Wireless networks</subject><ispartof>Wireless personal communications, 2024-02, Vol.134 (3), p.1469-1490</ispartof><rights>The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024. Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</citedby><cites>FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</cites><orcidid>0000-0002-9745-8266 ; 0000-0002-0903-6486</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s11277-024-10956-0$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/s11277-024-10956-0$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,41488,42557,51319</link.rule.ids></links><search><creatorcontrib>Mankotia, Vivek</creatorcontrib><creatorcontrib>Sunkaria, Ramesh Kumar</creatorcontrib><creatorcontrib>Gurung, Shashi</creatorcontrib><title>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</title><title>Wireless personal communications</title><addtitle>Wireless Pers Commun</addtitle><description>Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.</description><subject>Communications Engineering</subject><subject>Communications traffic</subject><subject>Computer Communication Networks</subject><subject>Denial of service attacks</subject><subject>Engineering</subject><subject>Mobile ad hoc networks</subject><subject>Monitoring</subject><subject>Networks</subject><subject>Nodes</subject><subject>Packets (communication)</subject><subject>Performance degradation</subject><subject>Performance evaluation</subject><subject>Performance measurement</subject><subject>Routing (telecommunications)</subject><subject>Shortest-path problems</subject><subject>Signal,Image and Speech Processing</subject><subject>Wireless networks</subject><issn>0929-6212</issn><issn>1572-834X</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><recordid>eNp9kLtOAzEQRS0EEuHxA1SWqA1jr_dFtySEIPEqgkRnef0gC5t1sB0hGr4dhyDRUU0x99wZHYROKJxRgPI8UMrKkgDjhEKdFwR20IjmJSNVxp930QhqVpOCUbaPDkJ4BUhYzUboazJv7i5wgyefg1x2Cs8X3oSF6zWWg8Z3buii893wgi9lMBrPjVoM3fva4Ojwo3fRqJhSbdcb3GiycArfm_jh_Bu23i3xZS_VG5m5tN70TXvn9KatiTEtwhHas7IP5vh3HqKn6dV8PCO3D9c34-aWqIzWkRTKak6rSmdcF7UpgEpb29bYHLiuS53bogUFzOTUclvw3EplqGx5XkGryzw7RKfb3pV36fkQxatb-yGdFBnwrCoLXtGUYtuU8i4Eb6xY-W4p_aegIDaexdazSJ7Fj2cBCcq2UFhtPBn_V_0P9Q2lXYCg</recordid><startdate>20240201</startdate><enddate>20240201</enddate><creator>Mankotia, Vivek</creator><creator>Sunkaria, Ramesh Kumar</creator><creator>Gurung, Shashi</creator><general>Springer US</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0002-9745-8266</orcidid><orcidid>https://orcid.org/0000-0002-0903-6486</orcidid></search><sort><creationdate>20240201</creationdate><title>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</title><author>Mankotia, Vivek ; Sunkaria, Ramesh Kumar ; Gurung, Shashi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c319t-6cfd4188d34d69e601af9fbef504d97d5f6b0c02e51f4f645face1ab4580bd753</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Communications Engineering</topic><topic>Communications traffic</topic><topic>Computer Communication Networks</topic><topic>Denial of service attacks</topic><topic>Engineering</topic><topic>Mobile ad hoc networks</topic><topic>Monitoring</topic><topic>Networks</topic><topic>Nodes</topic><topic>Packets (communication)</topic><topic>Performance degradation</topic><topic>Performance evaluation</topic><topic>Performance measurement</topic><topic>Routing (telecommunications)</topic><topic>Shortest-path problems</topic><topic>Signal,Image and Speech Processing</topic><topic>Wireless networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mankotia, Vivek</creatorcontrib><creatorcontrib>Sunkaria, Ramesh Kumar</creatorcontrib><creatorcontrib>Gurung, Shashi</creatorcontrib><collection>CrossRef</collection><jtitle>Wireless personal communications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mankotia, Vivek</au><au>Sunkaria, Ramesh Kumar</au><au>Gurung, Shashi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks</atitle><jtitle>Wireless personal communications</jtitle><stitle>Wireless Pers Commun</stitle><date>2024-02-01</date><risdate>2024</risdate><volume>134</volume><issue>3</issue><spage>1469</spage><epage>1490</epage><pages>1469-1490</pages><issn>0929-6212</issn><eissn>1572-834X</eissn><abstract>Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in wireless networks that consists of autonomous mobile nodes. These movable nodes can easily join and exit the network. Mobile nodes communicate with other nodes via intermediary nodes, eliminating the need for any fixed infrastructure. In this network, it is expected that intermediate nodes always assist in locating the destination node by rebroadcasting the request packet provided by the source node if the destination is not found in the routing table. However, in a real-world network, there may be some dishonest nodes that do not assist in identifying the best path for the destinations and instead deliver a fake route reply regarding the shortest path for destination nodes with the highest destination sequence number. The liar node's bogus route reply packet draws data traffic, resulting in packet loss in the network. This sort of malicious behavior on this network is sometimes referred to as a black-hole attack, which is an active attack that degrades network performance. A flooding attack is a form of denial-of-service attack that uses network bandwidth by flooding the flooder node with bogus packets. In a route request flooding attack, the flooder node uses a large number of false request packets to drain network resources. This work presents a Dynamic Threshold And Monitoring-based (DTAM) technique for protecting MANETs from black-hole and flooding attack. The NS-2 simulator is used to evaluate the performance of various protocols, and the findings reveal that the DTAM scheme outperforms the existing state-of-the-art schemes on various performance metrics.</abstract><cop>New York</cop><pub>Springer US</pub><doi>10.1007/s11277-024-10956-0</doi><tpages>22</tpages><orcidid>https://orcid.org/0000-0002-9745-8266</orcidid><orcidid>https://orcid.org/0000-0002-0903-6486</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0929-6212
ispartof Wireless personal communications, 2024-02, Vol.134 (3), p.1469-1490
issn 0929-6212
1572-834X
language eng
recordid cdi_proquest_journals_3043876481
source SpringerLink_现刊
subjects Communications Engineering
Communications traffic
Computer Communication Networks
Denial of service attacks
Engineering
Mobile ad hoc networks
Monitoring
Networks
Nodes
Packets (communication)
Performance degradation
Performance evaluation
Performance measurement
Routing (telecommunications)
Shortest-path problems
Signal,Image and Speech Processing
Wireless networks
title DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-28T08%3A51%3A56IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=DTAM:%20A%20Dynamic%20Threshold%20and%20Monitoring%20Based%20Technique%20to%20Protect%20Mobile%20Ad-hoc%20Network%20from%20Black-Hole%20and%20Flooding%20Attacks&rft.jtitle=Wireless%20personal%20communications&rft.au=Mankotia,%20Vivek&rft.date=2024-02-01&rft.volume=134&rft.issue=3&rft.spage=1469&rft.epage=1490&rft.pages=1469-1490&rft.issn=0929-6212&rft.eissn=1572-834X&rft_id=info:doi/10.1007/s11277-024-10956-0&rft_dat=%3Cproquest_cross%3E3043876481%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=3043876481&rft_id=info:pmid/&rfr_iscdi=true