Skip to main content

Stealthy Attacks in MANET to Detect and Counter Measure by Ant Colony Optimization

  • Conference paper
  • First Online:
Advances in Electronics, Communication and Computing

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 443))

Abstract

MANET (Mobile Ad Hoc Network) is the active wireless network which can produce communication less connections in which every node can perform as a router. Every node in the MANET is responsible for dynamically creating other nodes for communication. Protection is an important examine for the wireless and wired network communications in MANET. The achievement of MANET (mobile ad hoc networks) strappingly depends upon people’s assurance in its sanctuary. Though, uniqueness of MANET poses both opportunity and challenges in the accomplishment of security purpose, like authentication, privacy, access, availability, integrity, non-repudiation, and control. The malicious node presence is being a major challenge in MANET for designing the vigorous security solution which can defend the MANET from different routing attacks. We have categorized the existing security services and security threats in this mobile ad hoc network paper. The proposed approach gives a better solution in the achievement of present security threats in MANET. Based on monitoring system a guard node is recommended in this paper through which every activity occurred inside the network can be constantly monitored. If there is any abnormal action of Stealthy attack occurred inside the network then the Guard node collects and forwards the abnormal information toward the source node. In this guard node an algorithm based on Ant Colony optimization is deployed to recognize the threats which are present in the MANET’s network. This proposed system detects the stealthy attack and also resists the attackers from the network. Therefore, this approach makes the enhancement in the network packet delivery and its performance ratio, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Sheela, D., Srividhya,V.R., Asma, B., Anjali, Chidanand, G.M.: Detecting black hole attacks in wireless sensor networks using mobile agent. In: International Conference on Artificial Intelligence and Embedded Systems, Singapore (2012)

    Google Scholar 

  2. Kuthadi, V.M., Rajendra, C., Selvaraj, R.: A study of security challenges in wireless sensor networks. JATIT 20(1), 39–44 (2010)

    Google Scholar 

  3. Lee, S.J., Gerla, M.: Split multipath routing with maximally disjoint paths in ad hoc networks. In: IEEE International Conference on Communications, pp. 3201–3205 (2001)

    Google Scholar 

  4. Carbunar, B., Ioanisis, I., Cristina., N.: JANUS: towards robust and malicious resilient routing in hybrid wireless networks. In: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 11–20. NY (2004)

    Google Scholar 

  5. Khalil, S.B., Nina, R., Shroff, N.: UNMASK: utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. Ad Hoc Netw. J. 8(2), 148–164 (2010)

    Google Scholar 

  6. Huang,Y., and Lee,W.: A cooperative intrusion detection system for Ad Hoc networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 135–147 (2003)

    Google Scholar 

  7. Issa, H.: LITEWORP: A lightweight countermeasure for the wormhole attack in multihop wireless networks. In: Proceedings of the International conference on Dependable Systems and Networks. Washington, pp. 612–621 (2005)

    Google Scholar 

  8. Kuthadi, V.M., Selvaraj, R., Marwala, T.: An efficient web services framework for secure data collection in wireless sensor network. Br. J. Sci. 12(1), 18–31 (2015)

    Google Scholar 

  9. Baruch, A., Reza, C., David, H., Cristina, N., Herbet, R.: ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans. Inf. Syst. Secur. 10(4), 1–35 (2008)

    Google Scholar 

  10. Selvaraj, R., Kuthadi, V.M., Marwala, T.: Ant-based distributed denial of service detection technique using roaming virtual honeypots. IET Commun. 10(8), 929–935 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abhishek Ranjan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ranjan, A., Rajalakshmi Selvaraj, Kuthadi, V.M., Marwala, T. (2018). Stealthy Attacks in MANET to Detect and Counter Measure by Ant Colony Optimization. In: Kalam, A., Das, S., Sharma, K. (eds) Advances in Electronics, Communication and Computing. Lecture Notes in Electrical Engineering, vol 443. Springer, Singapore. https://doi.org/10.1007/978-981-10-4765-7_62

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4765-7_62

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4764-0

  • Online ISBN: 978-981-10-4765-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics