Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack

  • Deepika Kukreja
  • S. K. Dhurandher
  • B. V. R. Reddy
Original Research


A power aware detection procedure for securing mobile ad hoc networks (MANETs) against packet forwarding misbehavior attack is introduced. Packet forwarding misbehavior attack is one of the security attacks in which malicious nodes make MANETs weak by showing packet dropping misconduct. The proposed protocol is named as power aware malicious detection for security (PAMDS) protocol. The feature of power aware is desirable to prolong MANET lifetime as under certain conditions, it is impracticable to replace or recharge the nodes’ batteries. The protocol employs intrusion detection system (IDS) for the detection and exclusion of the nodes inducing packet forwarding misbehavior attack in the network. The detection procedure reacts quickly in detecting and isolating malicious nodes. The detection procedure is power aware as only a small set of nodes that have enough energy and that cover the entire network are selected for running IDS. Also, IDS nodes are not required to work in promiscuous listening mode 100% of the time, this further saves power. PAMDS protocol emphasizes on security of the mobile ad hoc environment and power saving of the battery powered hand held devices. The protocol has been extensively simulated using network simulator NS-2. The findings indicate that PAMDS protocol is effective in terms of power saving, quick malicious node isolation and packet delivery ratio percentage.


Mobile ad hoc networks Intrusion detection system Packet forwarding misbehavior Power aware Dynamic source routing protocol Security 


  1. Ahila E, Chitra K (2014) Security based energy efficient routing protocol for adhoc network. In: Proceedings of IEEE international conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 1522–1526. ISBN: 978-1-4799-4191-9Google Scholar
  2. Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61:123–140. doi: 10.1007/s11235-015-0068-8 CrossRefGoogle Scholar
  3. Asadi M, Zimmerman C, Agah A (2013) A game theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58Google Scholar
  4. Banergee S (2008) Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In: Proceedings of the world congress on engineering and computer science (WCECS 2008), WCECS, San Francisco, USA, pp 337–342. ISBN: 978-988-98671-0-2Google Scholar
  5. Biswas S, Nag T, Neogy S (2014) Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In: Proceedings of IEEE applications and innovations in mobile computing (AIMoC), pp 157–164. doi: 10.1109/AIMOC.2014.6785535. ISBN: 978-1-4799-3881-0
  6. Buchegger S, Boudec J Y L (2002) Performance analysis of the CONFIDANT protocol. In: Proceedings of 3rd ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’02), Lausanne, Switzerland, pp 226–236. doi: 10.1145/513800.513828. ISBN: 1-58113-501-7
  7. Cano J C, Kim D (2002) Investigating performance of power-aware routing protocols for mobile ad-hoc networks. In: Proceedings of the international workshop on mobility and wireless access (MobiWac 2002), IEEE Computer Society, Washington, DC, USA, pp 80–86. doi: 10.1109/MOBWAC.2002.1166956. ISBN: 0-7695-1843-5
  8. Dhurandher S K, Woungang I, Traore I (2014) C-SCAN: an energy-efficient network layer security protocol for mobile ad hoc networks. In: Proceedings of 28th IEEE international conference on advanced information networking and applications workshops (WAINA), pp 530–535. doi: 10.1109/WAINA.2014.85. ISBN: 978-1-4799-2654-1
  9. Estahbanati M M, Rasti M, Hamami S M S (2014) A mobile ad hoc network routing based on energy and Markov chain trust. In: Proceedings of IEEE 7th international symposium on telecommunications (IST), pp 596–601. doi: 10.1109/ISTEL.2014.7000775
  10. Ghander A, Shaaban E (2015) Power aware cooperation enforcement MANET routing protocols. Procedia Comput Sci 73:162–171. doi: 10.1016/j.procs.2015.12.062 CrossRefGoogle Scholar
  11. Gong P, Chen TM, Xu Q (2015) ETARP: An energy efficient trust-aware routing protocol for wireless sensor networks. J Sens. doi: 10.1155/2015/469793
  12. Gonzalez OF, Howarth M, Pavlou G (2008) Detection and accusation of packet forwarding misbehavior in mobile ad hoc networks. J Internet Eng 2:181–192Google Scholar
  13. Heena, Kumar N (2014) Battery power and trust based routing strategy for MANET. In: Proceedings of IEEE international conference on advanced communication control and computing technologies (ICACCCT), pp 1559–1562. doi: 10.1109/ICACCCT.2014.7019368. ISBN: 978-1-4799-3915-2
  14. Hu YC, Johnson DB, Perrig A (2003) SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Netw 1:175–192. doi: 10.1016/S1570-8705(03)00019-2 CrossRefGoogle Scholar
  15. Hu YC, Perrig A, Johnson DB (2005) Ariadne: a secure on-demand routing protocol for ad hoc networks. Wirel Netw 11:38. doi: 10.1007/s11276-004-4744-y CrossRefGoogle Scholar
  16. Jain H R, Sharma S K (2014) Improved energy efficient secure multipath AODV routing protocol for MANET. In: Proceedings of IEEE international conference on advances in engineering and technology research (ICAETR), pp 1–9. doi: 10.1109/ICAETR.2014.7012847
  17. Johnson D B, Maltz D A (1996) Dynamic source routing in ad hoc wireless networks. In: Mobile computing, the Kluwer International series in engineering and computer science, vol 353, Springer, US, pp 153–218. doi: 10.1007/978-0-585-29603-6_5. ISBN: 978-0-7923-9697-0
  18. Li J, Cordes D, Zhang J (2005) Power-aware routing protocols in ad hoc wireless networks. IEEE Wirel Commun 12:69–81. doi: 10.1109/MWC.2005.1561947 CrossRefGoogle Scholar
  19. Li Y, Peng S, Chu W (2006) An efficient algorithm for finding an almost connected dominating set of small size on wireless ad hoc networks. In: Proceedings of 2006 IEEE international conference on mobile adhoc and sensor systems (MASS), pp 199–205. doi: 10.1109/MOBHOC.2006.278557. ISBN: 1-4244-0506-8
  20. Lu Y, Zhong Y, Bhargava B (2003) Packet loss in mobile ad hoc networks. Computer Science Technical Reports, Paper 1558, Department of Computer Science, Purdue University. Report Number: 03-009.
  21. Marti S, Giuli T J, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of sixth annual international conference on mobile computing and networking (MobiCom ’00), Boston, USA, pp 255–265. doi: 10.1145/345910.345955. ISBN:1-58113-197-6
  22. Misra S, Dhurandher SK, Obaidat MS, Gupta P, Verma K, Narula P (2010) An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks. J Syst Softw 83:2188–2199. doi: 10.1016/j.jss.2010.06.025 CrossRefGoogle Scholar
  23. Mohanapriya M, Krishnamurthi I (2014) Modified DSR protocol for detection and removal of selective black hole attack in MANET. Comput Electr Eng 40:530–538. doi: 10.1016/j.compeleceng.2013.06.001 CrossRefGoogle Scholar
  24. Nadeem A, Howarth MP (2013) A survey of MANET intrusion detection and prevention approaches for network layer attacks. IEEE Commun Surv Tutor 15:2027–2045. doi: 10.1109/SURV.2013.030713.00201 CrossRefGoogle Scholar
  25. Network simulator 2 (NS–2). Accessed 13 Nov 2016
  26. Perrig A, Canetti R, Tygar J D, Song D (2000) Efficient authentication and signing of multicast streams over lossy channels. In: Proceedings of IEEE symposium on security and privacy, Berleley, USA. doi: 10.1109/SECPRI.2000.848446. ISBN: 1081-6011
  27. Sarkar S, Datta R (2012) A trust based protocol for energy-efficient routing in self-organized MANETs. In: Proceedings of annual IEEE India Conference (INDICON), pp 1084–1089. doi: 10.1109/INDCON.2012.6420778. ISBN: 978-1-4673-2270-6
  28. Sarkar S, Datta R (2014) A secure and energy-efficient stochastic routing protocol for wireless mobile ad-hoc networks. In: Proceedings of IEEE twentieth national conference on communications (NCC), pp 1–6. doi: 10.1109/NCC.2014.6811358. ISBN: 978-1-4799-2363-2
  29. Sarkar S, Datta R (2016) A secure and energy-efficient stochastic multipath routing for self-organized mobile ad hoc networks. Ad Hoc Netw 37:209–227. doi: 10.1016/j.adhoc.2015.08.020 CrossRefGoogle Scholar
  30. Sheu JP, Chao CM, Hu WK, Sun CW (2007) A clock synchronization algorithm for multihop wireless ad hoc networks. Wirel Pers Commun 43:185–200. doi: 10.1007/s11277-006-9217-4 CrossRefGoogle Scholar
  31. Sridhar S, Baskaran R, Chandrasekar P (2013) Energy supported AODV (EN-AODV) for QoS routing in MANET, In: Proceedings of the 2nd international conference on integrated information (IC-ININFO 2012), Budapest, Hungary, vol 73 of Procedia—Social and Behavioral Sciences, pp 294–301. doi: 10.1016/j.sbspro.2013.02.055
  32. Su MY (2011) Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comput Commun 34:107–117. doi: 10.1016/j.comcom.2010.08.007 CrossRefGoogle Scholar
  33. Subramaniam S, Ramachandran R (2014) Energy-and trust-based AODV for quality-of-service affirmation in MANETs. In: Artificial intelligence and evolutionary algorithms in engineering systems, vol 324 of the series advances in intelligent systems and computing. Springer India, pp 601–607. doi: 10.1007/978-81-322-2126-5_65. ISBN: 978-81-322-2125-8
  34. Tan S, Li X, Dong Q (2015) Trust based routing mechanism for securing OSLR-based MANET. Ad Hoc Netw 30:84–98. doi: 10.1016/j.adhoc.2015.03.004 CrossRefGoogle Scholar
  35. Vazifehdan J, Prasad RV, Onur E, Niemegeers I (2011) Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies. Comput Netw 55:3256–3274. doi: 10.1016/j.comnet.2011.06.015 CrossRefGoogle Scholar
  36. Wang Y (2010) Study on energy conservation in MANET. J Netw 5:708–715Google Scholar
  37. Woungang I, Dhurandher S K, Sahai M (2013) An energy-aware secured routing protocol for mobile ad hoc networks using trust-based multipath. In: Grid and pervasive computing, vol 7861 of the series lecture notes in computer science. Springer, Berlin, pp 517–525. doi: 10.1007/978-3-642-38027-3_55. ISBN: 978-3-642-38026-6
  38. Yang H, Shu J, Meng X, Lu S (2006) SCAN: self-organized network-layer security in mobile ad hoc networks. IEEE J Sel Areas Commun 24:261–273. doi: 10.1109/JSAC.2005.861384 CrossRefGoogle Scholar
  39. Yang T, Wei L (2007) Modified energy-aware DSR routing for ad hoc network. In: Proceedings of the international conference on wireless communications, networking and mobile computing (WiCom 2007), pp 1601–1603. doi: 10.1109/WICOM.2007.403
  40. Zapata MG (2002) Secure ad hoc on-demand distance vector routing. ACM SIGMOBILE Mobile Comput Commun 6:106–107. doi: 10.1145/581291.581312 CrossRefGoogle Scholar
  41. Zhang Y, Lee W (2005) Security in mobile ad-hoc networks. In: Ad hoc networks, pp 249–268. doi: 10.1007/0-387-22690-7_9. ISBN: 978-0-387-22689-7

Copyright information

© Springer-Verlag Berlin Heidelberg 2017

Authors and Affiliations

  • Deepika Kukreja
    • 1
  • S. K. Dhurandher
    • 1
  • B. V. R. Reddy
    • 2
  1. 1.Division of Information TechnologyN.S.I.T., University of DelhiDelhiIndia
  2. 2.U.S.I.C.T., Guru Gobind Singh Indraprastha UniversityDelhiIndia

Personalised recommendations