PDF
(1850KB)
Abstract
Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of communication and data collection, the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally, namely, according to the established network rules. However, mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution, openness, and distributed characteristics. Therefore, during the network operation, it is necessary to classify and detect the behavior and characteristics of each node. However, most existing research only analyzes and considers responses against a single or small number of attacks. To address these issues, this article first systematically analyzed and classified common active attacks in MANETs. Then, a node trust model was proposed based on the characteristics of various attacks; subsequently, a new secure routing protocol, namely, TC-AODV, was proposed. This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop, wormhole, Session hijacking, and other main attacks in MANETs. The NS3 simulation results show that the proposed routing protocol attains good transmission performance, can effectively identify various attacks and bypass malicious nodes, and securely complete the communication process.
Keywords
Mobile ad hoc networks
/
AODV
/
Trust level
/
Secure routing protocol
/
Reliable path
Cite this article
Download citation ▾
Shaohu Li, Bei Gong.
Developing a reliable route protocol for mobile self-organization networks.
High-Confidence Computing, 2024, 4(3): 100194 DOI:10.1016/j.hcc.2023.100194
Declaration of competing interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgments
This work was supported in part by the National Key Research and Development Project of China (2019YFB2102303) and in part by the National Natural Science Foundation of China (61971014).
| [1] |
S. Mirza, S.Z. Bakshi, Introduction to MANET, Int. Res. J. Eng. Technol. 5 (1) (2018) 17-20.
|
| [2] |
M. Abu Zant, A. Yasin, Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV), Secur. Commun. Netw. 2019 (2019).
|
| [3] |
G. Liu, Z. Yan, W. Pedrycz, Data collection for attack detection and security measurement in mobile ad hoc networks: A survey, J. Netw. Comput. Appl. 105 (2018) 105-122.
|
| [4] |
M. Tahboush, M. Agoyi, A hybrid wormhole attack detection in mobile ad-hoc network (MANET), IEEE Access 9 (2021) 11872-11883, http://dx.doi.org/10.1109/ACCESS.2021.3051491.
|
| [5] |
S. Abbas, M. Merabti, D. Llewellyn-Jones, et al., Lightweight sybil attack detection in manets, IEEE Syst. J. 7 (2) (2012) 236-248.
|
| [6] |
K. Hussain, S.J. Hussain, N.Z. Jhanjhi, et al., SYN flood attack detection based on bayes estimator (SFADBE) for MANET, in: 2019 International Conference on Computer and Information Sciences, ICCIS, IEEE, 2019, pp. 1-4.
|
| [7] |
G. Farahani, Black hole attack detection using K-nearest neighbor algorithm and reputation calculation in mobile ad hoc networks, Secur. Commun. Netw. 2021 (2021) 1-15.
|
| [8] |
Zhipeng Cai, Zaobo He, Xin Guan, Yingshu Li, Collective data-sanitization for preventing sensitive information inference attacks in social networks, IEEE Trans. Depend. Secure Comput. 15 (4) (2018) 577-590.
|
| [9] |
Z. Cai, X. Zheng, J. Wang, et al., Private data trading towards range counting queries in internet of things, IEEE Trans. Mobile Comput. (2022).
|
| [10] |
Zhipeng Cai, Zaobo He, Trading private range counting over big IoT data, in: The 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019.
|
| [11] |
S. Gupta, M. Shahid, A. Goyal, et al., Black hole detection and prevention using digital signature and SEP in MANET, in: 2022 10th International Conference on Emerging Trends in Engineering and Technology-Signal and Information Processing, ICETET-SIP-22, IEEE, 2022, pp. 1-5.
|
| [12] |
Z.A. Zardari, K.A. Memon, R.A. Shah, et al., A lightweight technique for detection and prevention of wormhole attack in MANET, EAI Endorsed Trans. Scalable Inf. Syst. 8 (29) (2021) e2.
|
| [13] |
A. Sharma, E.S. Pilli, A.P. Mazumdar, M.C. Govil, A framework to manage trust in internet of things, in: 2016 International Conference on Emerging Trends in Communication Technologies, ETCT, Dehradun, India, 2016, pp. 1-5, http://dx.doi.org/10.1109/ETCT.2016.7882970.
|
| [14] |
G.C. Karmakar, R. Das, J. Kamruzzaman, IoT sensor numerical data trust model using temporal correlation, IEEE Internet Things J. 7 (4) (2020) 2573-2581, http://dx.doi.org/10.1109/JIOT.2019.2957201.
|
| [15] |
S.E.A. Rafey, A. Abdel-Hamid, M.A. El-Nasr, CBSTM-IoT: Context-based social trust model for the internet of things, in: 2016 International Conference on Selected Topics in Mobile & Wireless Networking, MoWNeT, Cairo, Egypt, 2016, pp. 1-8, http://dx.doi.org/10.1109/MoWNet.2016.7496623.
|
| [16] |
K. Kang, Z. Pang, L.D. Xu, L. Ma, C. Wang, An interactive trust model for application market of the internet of things, IEEE Trans. Ind. Inf. 10 (2) (2014) 1516-1526, http://dx.doi.org/10.1109/TII.2014.2306799.
|
| [17] |
Zhipeng Cai, Xu Zheng, A private and efficient mechanism for data uploading in smart cyber-physical systems, IEEE Trans. Netw. Sci. Eng. (TNSE) 7 (2) (2020) 766-775.
|
| [18] |
Le Duc Huy, Truong Thi Thu Ha, Nguyen Van Tam, BDAODV: A security routing protocol to detect the black hole attacks in mobile ad hoc networks, J. Commun. 17 (10) (2022) 803-811, http://dx.doi.org/10.12720/jcm.17.10.803-811.
|
| [19] |
R. Ramalingam, R. Muniyan, A. Dumka, et al., Routing protocol for MANET based on qos-aware service composition with dynamic secured broker selection, Electronics 11 (17) (2022) 2637.
|
| [20] |
S.N. Pari, K. Sudharson, Hybrid trust based reputation mechanism for discovering malevolent node in MANET, Comput. Syst. Sci. Eng. 44 (3) (2023).
|
| [21] |
A.K. Biswas, M. Dasgupta, A secure hybrid routing protocol for mobile ad-hoc networks (MANETs), in: 2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT, Kharagpur, India, 2020, pp. 1-7, http://dx.doi.org/10.1109/ICCCNT49239.2020.9225474.
|
| [22] |
R. Prasad, Enhanced energy efficient secure routing protocol for mobile ad-hoc network, Global Trans. Proc. 3 (2) (2022) 412-423.
|
| [23] |
K. Ourouss, N. Naja, A. Jamali, Defending against smart grayhole attack within MANETs: A reputation-based ant colony optimization approach for secure route discovery in DSR protocol, Wirel. Pers. Commun. 116 (2021) 207-226.
|
| [24] |
H. Kanagasundaram, K. Ayyaswamy, Multi objective ALO based energy efficient and secure routing OLSR protocol in MANET, Int. J. Intell. Eng. Syst. 12 (2019).
|
| [25] |
U. Srilakshmi, N. Veeraiah, Y. Alotaibi, et al., An improved hybrid secure multipath routing protocol for MANET, IEEE Access 9 (2021) 163043-163053.
|
| [26] |
A.M. El-Semary, H. Diab, BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map, IEEE Access 7 (2019) 95197-95211, http://dx.doi.org/10.1109/ACCESS.2019.2928804.
|
| [27] |
Le Quang Minh, AODV-MSA: A security routing protocol on mobile ad hoc network, J. Commun. 16 (4) (2021) 143-149, http://dx.doi.org/10.12720/jcm.16.4.143-149.
|