Analysis of Behavioral Characteristics of Jammers to Detect Malicious Nodes in Mobile ADHOC Networks

Main Article Content

Adilakshmi Yannam
Basaveswara Mukesh Suryadevara
Thabassum
V. Mohan Sai
Manoj Vatturi

Abstract

Wireless ADHOC Networks are used to establish a wireless connection between two computing devices without the need for a Wi-Fi access point or router. This network is decentralized and uses omnidirectional communication media, which makes it more vulnerable to certain types of attacks compared to wired networks. Jamming attacks, a subset of denial-of-service (DoS) attacks, involve malicious nodes that intentionally interfere with the network, blocking legitimate communication. To address this issue, the proposed method analyzes various characteristics of nodes, such as packets sent, received, and dropped, at each node. Using the packet delivery ratio and packet drop ratio, the method detects jamming nodes from normal nodes, improving network performance. The network is simulated in NS2 environment.

Article Details

How to Cite
Yannam, A. ., Suryadevara, B. M. ., Thabassum, T., Sai, V. M. ., & Vatturi, M. . (2023). Analysis of Behavioral Characteristics of Jammers to Detect Malicious Nodes in Mobile ADHOC Networks. International Journal on Recent and Innovation Trends in Computing and Communication, 11(5s), 494–510. https://doi.org/10.17762/ijritcc.v11i5s.7111
Section
Articles

References

Adilakshmi, Y. (2022). Node Behaviour Classification Using SVM & Decision Tree to Detect Malicious Nodes in MANET. The International Journal of Analytical and Experimental Modal Analysis, ISSN NO: 0886-9367.

Indira, D.N.V.S.L.S., Abinaya, R., et al. (2021). Secured Personal Health Records using Pattern Based Verification and 2-Way Polynomial Protocol in Cloud Infrastructure. International Journal of Ad Hoc and Ubiquitous Computing, 40(3), 86-93. ISSN: 1743-8233.

Singh, S. ., Wable, S. ., & Kharose, P. . (2021). A Review Of E-Voting System Based on Blockchain Technology. International Journal of New Practices in Management and Engineering, 10(04), 09–13. https://doi.org/10.17762/ijnpme.v10i04.125.

Kim, J., Biswas, P. K., Bohacek, S., Mackey, S. J., Samoohi, S., & Patel, M. P. (2021). Advanced protocols for the mitigation of friendly jamming in mobile ad-hoc networks. Journal of Network and Computer Applications, 181, 103037.

Bhavani M., & M. Durgadevi. (2023). Streamlined Classification of Microscopic Blood Cell Images. International Journal of Intelligent Systems and Applications in Engineering, 11(1s), 57–62. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/2477.

S. Shrestha, R. Baidya, B. Giri, and A. Thapa, "Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol," in 2020 8th International Electrical Engineering Congress (iEECON), Chiang Mai, Thailand, 2020, pp. 1-4, doi: 10.1109/iEECON48109.2020.229555.

Adilakshmi, Y., & Prasad, G. V. S. N. R. V. (2019). Trust aware intrusion detection system to defend attacks in MANETs. International Journal of Innovative Technology and Exploring Engineering (IJITEE), 8(6), 1298-1304.

Adilakshmi Y, & G. V. S. N. R. V. Prasad. "Cooperative intrusion detection system to enhance the security in MANET." Journal of Advanced Research in Dynamical and Control Systems 11, no. 2 (2019): 100-109.

Guo, Y., Zhang, H., Zhang, L., Fang, L., & Li, F. (2019). A game theoretic approach to cooperative intrusion detection. Journal of Computational Science, 30, 118-124.

B. S. M. Y, R. Ibrahim, and A. Amiruddin, "Lightweight method for detecting fake authentication attack on Wi-Fi," in 2019 6th International Conference on Electrical Engineering, Computer Science and Informatics (EECSI), pp. 280-285, 2019. doi: 10.23919/EECSI48112.2019.8976975.

Basaligheh, P. (2021). A Novel Multi-Class Technique for Suicide Detection in Twitter Dataset. Machine Learning Applications in Engineering Education and Management, 1(2), 13–20. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/14.

Mark White, Kevin Hall, Ana Silva, Ana Rodriguez, Laura López. Predicting Educational Outcomes using Social Network Analysis and Machine Learning . Kuwait Journal of Machine Learning, 2(2). Retrieved from http://kuwaitjournals.com/index.php/kjml/article/view/182.

A. S. A. Alghamdi, S. R. Hasan, M. F. Hassan, and M. S. Ali, "Jamming and anti-jamming techniques in wireless sensor networks: a comprehensive study," Wireless Personal Communications, vol. 105, no. 2, pp. 581-616, 2019.

Bhunia, S., Regis, P.A., & Sengupta, S. (2018). Distributed Adaptive Beam Nulling to Survive Against Jamming in 3D UAV Mesh Networks. Computer Networks, 133, 153-166. DOI: 10.1016/j.comnet.2018.03.011

Alotaibi B, & Elleithy K,“Rogue access point detection: Taxonomy, challenges, and future directions” Wireless Personal Communications, 2016, 90(3), 1261–1290.

Kao K. F, Chen W. C, Chang J. C, & Chu, H. T, “An accurate fake access point detection method based on deviation of beacon time interval”, 2014 IEEE Eighth international conference on software security and reliability-companion (pp. 1–2), http://dx.doi.org/10.1109/SERE- C.2014.13.

Jadhav P. N, &Patil, B. M, “Low-rate DDoS attack detection using optimal objective entropy method”, International Journal of Computer Applications, 2013, 78(3).

N. Sufyan, N. A. Saqib, and Z. Muhammad, “Detection of jamming attacks in 802.11b wireless networks”, EURASIP Journal on Wireless Communications and Networking, vol. 2013, article 208, 2013.

Khairnar, V. D, & Kotecha, K,“Simulation-Based Performance Evaluation of Routing Protocols in Vehicular Ad-hoc Network” International Journal of Scientific and Research Publications, 2013, 3(10), ISSN: 2250-3153.

Ali Ahmed, Machine Learning in Healthcare: Applications and Challenges , Machine Learning Applications Conference Proceedings, Vol 1 2021.

T. Cheng, P. Li, S. Zhu, “An algorithm for jammer localization in wireless sensor networks”, Proceedings of the 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), Fukuoka, Japan, March 2012.

D. Torrieri, S. Zhu, S. Jajodia, “Moving Target Defense: Application of Game Theory and Adversary Modeling”, Springer, 2012, pp. 87–96 (Chapter Cyber Maneuver Against External Adversaries and Compromised Nodes).

Han C, In-Jang J, feng Shao J, Chae K, Seong-Soo B, & Jung S,“A scheme of detection and prevention rogue AP using comparison security condition of AP”, 2012.

Faris, W. F. . (2020). Cataract Eye Detection Using Deep Learning Based Feature Extraction with Classification. Research Journal of Computer Systems and Engineering, 1(2), 20:25. Retrieved from https://technicaljournals.org/RJCSE/index.php/journal/article/view/7.

Chumchu P, Saelim T, &Sriklauy C,“A new MAC address spoofing detection algorithm using PLCP header”, In The International conference on information networking 2011 (pp. 48–53), IEEE.

H. Liu, Z. Liu, Y. Chen, W. Xu, “Determining the position of a jammer using a virtual-force iterative approach”, Wireless Networks. 17 (2) (2011) 531–547.

XiangY, Li K, & Zhou W,“Low-rate DDoS attacks detection and traceback by using new information metrics”, IEEE transactions on information forensics and security, 2011, 6(2), 426-437.

Arackaparambil C, Bratus S, Shubina A, &Kotz D,“On the reliability of wireless fingerprinting using clock skews”, In Proceedings of the third ACM Conference on wireless network security (pp. 169–174), 2010.

Hamieh A, Ben-othman J, “Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution”, in IEEE International Conference on Communications, 2009 ICC '09, pp.1-6, 14-18 June 2009.

J. Blumenthal, R. Grossmann, F. Golatowski, D. Timmermann, “Weighted centroid localization in zigbee-based sensor networks”, Proceedings of the IEEE International Symposium on Intelligent Signal Processing (WISP 2007), October 2007.

Guo F, &Chiueh T,“Sequence number-based MAC address spoof detection. In International workshop on recent advances in intrusion detection” (pp. 309–329), 2005, Springer.