Enhancing Reliability in Mobile Ad Hoc Networks (MANETs) Through the K-AOMDV Routing Protocol to Mitigate Black Hole Attacks

SN Computer Science - Tập 5 - Trang 1-11 - 2024
Sheetal Kaushik1, Khushboo Tripathi2, Rashmi Gupta2, Prerna Mahajan3
1Amity School of Engineering and Technology, Amity University Haryana, Gurugram, India
2Department of Computer Science and Engineering, Amity School of Engineering and Technology, Amity University Haryana, Gurugram, India
3IITM Janakpuri, New Delhi, India

Tóm tắt

A Mobile Ad Hoc Network (MANET) is a self-organize assemblage of mobile nodes without the use of pre-existing infrastructure. They face challenges of security, routing efficiency, and network stability due to dynamic topology and limited resources. The Black Hole Attack on MANETs is a critical concern, affecting communication reliability. This malicious activity involves a node falsely advertising the shortest route to the destination, leading data packets to be routed into a “black hole” where they are dropped and causing severe disruptions. This research focuses on the Ad Hoc On-Demand Multi-Path Distance Vector Routing (AOMDV) protocol, which is preferred for its improved efficiency compared to a single-path routing protocol in MANETs. We observe, investigate, and estimate wireless ad-hoc network route optimization by reducing packet hops between nodes. We suggested a novel strategy in this paper, the K-AOMDV protocol that uses K-means clustering to prevent routing misbehavior. The efficiency of the proposed K-AOMDV (KNN-Ad-hoc on demand multi-path distance vector) routing protocol is calculated using supervised machine learning approach to predict optimal routes with delay and attacks. By employing multiple paths and dynamic route discovery, it ensures robust data delivery even in the presence of malicious nodes. This protocol’s adaptability and multi-path nature effectively minimize the effects of Black Hole Attacks, bolstering the MANETs security. Proposed algorithm has a high accuracy rate of 0.99%, 80% true positives, and 80% recall.

Tài liệu tham khảo

Abdali ATAN, Muniyandi RC. Optimized model for energy-aware location aided routing protocol in MANET. Int J Appl Eng Res. 2017;12(14):4631–7. Abdali, Naser TA, Hassan R, Muniyandi RC, Aman AHM, Nguyen QN, AlKhaleefa AS. Optimized particle swarm optimization algorithm for the realization of an enhanced energy-aware location-aided routing protocol in MANET. Information. 2020;11(11):529. Abdan M & Seno SAH. Machine learning methods for intrusive detection of wormhole attack in mobile ad hoc network (MANET). Wirel Commun Mob Comput. 2022. Ali SN, Tiwari SP. Detection of wormhole attack in vahicular ad-hoc network over real map using machine learning approach with preventive scheme. J Inf Technol Manage. 2022;14:159–79. Alsatian A, Alauthman M, Alshdaifat E, Al-Ghuwairi AR, Ahmed A-D. Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. J Ambient Intell Humaniz Comput. 2021. https://doi.org/10.1007/s12652-021-02963-x. Bai Y, Mai Y &Wang N. Performance comparison and evaluation of the proactive and reactive routing protocols for MANETs. Wireless Telecommunications Symposium (W.T.S.), 2017;p. 1–5. IEEE. Benatia SE, Smail O, Meftah B, Rebbah M, Cousin B. A reliable multi-path routing protocol based on link quality and stability for MANETs in urban areas. Simul Modell Pract Theory. 2021;113: 102397. Bhardwaj & Kumar A. Machine learning based power efficient optimized communication ensemble model with intelligent fog computing for W.S.N.s. 2022. Bhardwaj N, Singh R. Detection and avoidance of blackhole attack in A.O.M.D.V. protocol in MANETs. Int J Appl Innov Eng Manage. 2014;3(5):376–83. Bhole K, Agashe S & Wadgaonkar J. How expert is EXPERT for fuzzy logic-based system. In: International proceedings on advances in soft computing, intelligent systems, and applications. Springer, Singapore, 2018; p. 29–36. Chen L, Hu B, Guan ZH, Zhao L, Xuemin Shen X. Multi-agent meta-reinforcement learning for adaptive multi-path routing optimization. IEEE Trans Neural Netw Learn Syst. 2021. https://doi.org/10.1109/TNNLS.2021.3070584. Chettibi S, Chikhi S. Dynamic fuzzy logic and reinforcement learning for adaptive energy-efficient routing in mobile ad-hoc networks. Appl Soft Comput. 2016;38:321–8. Dugaev DA, Matveev GI, Siemens E & Shuvalov VP. Adaptive reinforcement learning-based routing protocol for wireless multi-hop networks. XIV International Scientific-Technical Conference on Actual Problems of Electronic Instrument Engineering (A.P.E.I.E.), 2018; p. 209–18, IEEE. Guo W, Yan C, Lu T. Optimizing the lifetime of wireless sensor networks via reinforcement-learning-based routing. Int J Distrib Sensor Netw. 2019;15(2):1550147719833541. Hossain S, Hussain MS, Ema RR, Dutta S, Sarkar S & Islam T. Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in A.O.D.V. and A.O.M.D.V. routing protocols in MANET. 10th International Conference on Computing, Communication and Networking Technologies (I.C.C.C.N.T.), 2019;p. 1–7. Kaushik S, Tripathi K, Gupta R & Mahajan P. Performance analysis of AODV and SAODV routing protocol using SVM against black hole attack. 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Vol. 2, 2022; p. 455–59, IEEE. Kaushik S, Tripathi K, Gupta R & Mahajan P. Futuristic analysis of machine learning based routing protocols in wireless ad hoc networks. Fourth International Conference on Computational Intelligence and Communication Technologies (CCICT). 2021; p. 324–329. IEEE. Khan T, Singh K, Manjul M, Ahmad MM, Zain AM, Ahmadian A. A Temperature-aware trusted routing scheme for sensor networks: security approach. Comput Electric Eng. 2022;98: 107735. Kumar A, Singh K, Khan T. L-RTAM: Logarithm based reliable trust assessment model for WBSNs. J Discrete Math Sci Cryptogr. 2021;24(6):1701–16. Kumar A, Singh K, Khan T, Ahmadian A, Md Saad MH, Manjul M. ETAS: an efficient trust assessment scheme for BANs. IEEE Access. 2021;9:83214–33. Mili R & Chikhi S. Reinforcement learning based routing protocols analysis for mobile ad-hoc networks. Int Conf Mach Learn Netw. 2018; 247–256. Mirza S, Gujarathi T and Bhole K. Cardiovascular risk assessment using intuitionistic fuzzy logic system. In: 2019 10th International Conference on Computing, Communication and Networking Technologies (I.C.C.C.N.T.), p. 1–7. IEEE Murty K, Rajalakshmi MVDS. Secure and light weight Aodv (SLW-AODV) routing protocol for resilience against blackhole attack in manets. Int J Soft Comput Eng (IJSCE). 2023;13(1). (ISSN: 2231–2307 (Online)) Rad D, Rad G, Maier R, Demeter E, Dicu A, Popa M, Alexuta D, Floroian D, Mărineanu VD. A fuzzy logic modeling approach on psychological data. J Intell Fuzzy Syst Preprint. 2022. https://doi.org/10.3233/JIFS-219274. Raj JS. Machine learning-based resourceful clustering with load optimization for wireless sensor networks. J Ubiquitous Comput Commun Technol (UCCT). 2020;2(01):29–38. Reddy B, Prabhakar & Bhaskar. The AODV routing protocol with built-in security to counter blackhole attack in MANET, 2nd International Conference on Functional Material, Manufacturing and Performances. 2021. Safaei B, Monazzah AMH, Bafroei MB & Ejlali A. Reliability side-effects in the Internet of Things application layer protocols. In: 22nd International Conference on System Reliability and Safety (I.C.S.R.S.), 2017; p. 207–12. Sarao P. Evaluation of traffic models under multiple black hole attack in wireless mesh network. J Commun. 2023;18(3). Sivanesan N & Archana KS. A machine learning approach to detect network layer attacks in mobile ad hoc networks. Int J Early Childhood. 2022;14(03). Srinidhi N, Nagarjun NE, Kumar SMD. Hybrid algorithm for efficient node and path in opportunistic IoT network. J Inf Technol Manage. 2021;13:68–91. Tami A, Hacene SB, Cherif MA. Detection and prevention of blackhole attack in the AOMDV routing protocol. J Commun Softw Syst. 2021;17(1):1–12. Tian Y & Hou R. An improved A.O.M.D.V. routing protocol for the internet of things. In 2010 International Conference on Computational Intelligence and Software Engineering, 2010;p. 1–4. IEEE. Verma C, Gupta CC. Epidemiological model of stability analysis of wireless sensor network under malware attack. J Inf Technol Manag. 2022;14:69–88. Yasin A, Zant MA. Detecting and isolating blackhole attacks in MANET using timer based baited technique. Wirel Commun Mob Comput. 2018. https://doi.org/10.1155/2018/9812135.