Loading...
Routing and MAC Layer based Framework for Secure and Reliable Communication in Mobile Ad Hoc Networks


Journal of Computer and Communication Networks

Received On : 18 January 2025

Revised On : 28 February 2025

Accepted On : 25 March 2025

Published On : 24 April 2025

Volume 01, 2025

Pages : 061-071


Abstract

The research outlines three novel methods of detecting malicious nodes, which include Cumulative Frequency Detection, Data Forwarding Behaviors Detection, and MAC-based Authentication. These algorithms are used in ensuring reliable security for the Mobile Ad hoc Networks (MANETs). The purpose of Cumulative Frequency Detection is to determine indications of activities as a DoS attack or a heavily loaded channel. This is achieved by adding the total number of clear to send (CTS) and request to send (RTS) packets relayed by the channel over a particular time interval. The Data Forwarding Behaviors Detection is a database-based trust values to find the relationship between forwarding nodes and to modify the routing algorithm based on it and exclude the suspicious or untrusted nodes. The MAC Based Authentication process uses the Message Authentication Codes (MACs) in the shared key cryptographic system to authenticate the request and the response. The issues that are associated with the unauthorized nodes may be resolved in line with the application of the above Combined Solution for Routing and MAC (CSRM) layer attacks, as explained in the paper. Therefore, there is less control overhead and low loss of packets during the transmission in wireless communication. This also improves the security aspects and makes a connection to another MANET irrespective of the hostile, dynamic and unpredictable nature of the network environment.

Keywords

Mobile Ad Hoc Networks (MANETs), Combined Solution for Routing and MAC Layer (CSRM), Message Authentication Codes (MACs), Denial of Service (DoS), Clear to Send (CTS), Request to Send (RTS).

  1. A. Konak, G. E. Buchert, and J. Juro, “A flocking-based approach to maintain connectivity in mobile wireless ad hoc networks,” Applied Soft Computing, vol. 13, no. 2, pp. 1284–1291, Feb. 2013, doi: 10.1016/j.asoc.2012.10.020.
  2. R. Roman, J. Zhou, and J. Lopez, “On the features and challenges of security and privacy in distributed internet of things,” Computer Networks, vol. 57, no. 10, pp. 2266–2279, Jul. 2013, doi: 10.1016/j.comnet.2012.12.018.
  3. P.-W. Yau and C. J. Mitchell, “Security Vulnerabilities in Ad Hoc Networks,” CORE, Jan. 2003, [Online]. Available: http://www.chrismitchell.net/sviahn.pdf.
  4. N. Raj, P. Bharti, and S. Thakur, “Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network,” 2015 Fifth International Conference on Communication Systems and Network Technologies, pp. 771–775, Apr. 2015, doi: 10.1109/csnt.2015.101.
  5. A. Zemlianov and Gustavo de Veciana, “Capacity of ad hoc wireless networks with infrastructure support,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 3, pp. 657–667, Mar. 2005, doi: 10.1109/jsac.2004.842536.
  6. Jiancong Chen, Shejie Li, S.-H. G. Chan, and Jingyi He, “WIANI: wireless infrastructure and ad-hoc network integration,” IEEE International Conference on Communications, 2005. ICC 2005. 2005, vol. 5, pp. 3623–3627, doi: 10.1109/icc.2005.1495092.
  7. D. M. Shila and Yu Cheng, “Ad hoc wireless networks meet the infrastructure: Mobility, capacity and delay,” 2012 Proceedings IEEE INFOCOM, pp. 3031–3035, Mar. 2012, doi: 10.1109/infcom.2012.6195753.
  8. P. Sakarindr and N. Ansari, “Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks,” IEEE Wireless Communications, vol. 14, no. 5, pp. 8–20, Oct. 2007, doi: 10.1109/mwc.2007.4396938.
  9. Vikram Srinivasan, Pavan Nuggehalli, C. F. Chiasserini, and R. R. Rao, “Cooperation in wireless ad hoc networks,” IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp. 808–817 vol.2, 2003, doi: 10.1109/infcom.2003.1208918.
  10. V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini, and R. R. Rao, “An analytical approach to the study of cooperation in wireless ad hoc networks,” IEEE Transactions on Wireless Communications, vol. 4, no. 2, pp. 722–733, Mar. 2005, doi: 10.1109/twc.2004.842950.
  11. M. Cardei, J. Wu, and S. Yang, “Topology control in ad hoc wireless networks using cooperative communication,” IEEE Transactions on Mobile Computing, vol. 5, no. 6, pp. 711–724, Jun. 2006, doi: 10.1109/tmc.2006.87.
  12. S. Kumar and K. Dutta, “Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges,” Security and Communication Networks, vol. 9, no. 14, pp. 2484–2556, May 2016, doi: 10.1002/sec.1484.
  13. K. Khan, A. Mehmood, S. Khan, M. A. Khan, Z. Iqbal, and W. K. Mashwani, “A survey on intrusion detection and prevention in wireless ad-hoc networks,” Journal of Systems Architecture, vol. 105, p. 101701, May 2020, doi: 10.1016/j.sysarc.2019.101701.
  14. A. Abduvaliyev, A.-S. K. Pathan, Jianying Zhou, R. Roman, and Wai-Choong Wong, “On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks,” IEEE Communications Surveys & Tutorials, vol. 15, no. 3, pp. 1223–1237, 2013, doi: 10.1109/surv.2012.121912.00006.
  15. B. K. Tripathy, S. K. Jena, V. Reddy, S. Das, and S. K. Panda, “A novel communication framework between MANET and WSN in IoT based smart environment,” International Journal of Information Technology, vol. 13, no. 3, pp. 921–931, Oct. 2020, doi: 10.1007/s41870-020-00520-x.
  16. E. Garcia-Villegas, M. S. Afaqui, and E. Lopez-Aguilera, “A novel cheater and jammer detection scheme for IEEE 802.11-based wireless LANs,” Computer Networks, vol. 86, pp. 40–56, Jul. 2015, doi: 10.1016/j.comnet.2015.05.003.
  17. M. Meghdadi, S. Ozdemir, and I. Güler, “A Survey of Wormhole-based Attacks and their Countermeasures in Wireless Sensor Networks,” IETE Technical Review, vol. 28, no. 2, p. 89, 2011, doi: 10.4103/0256-4602.78089.
  18. M. Al-Shurman, S.-M. Yoo, and S. Park, “Black hole attack in mobile Ad Hoc networks,” Proceedings of the 42nd annual Southeast regional conference, pp. 96–97, Apr. 2004, doi: 10.1145/986537.986560.
  19. A. K. Ali, B. Sharma, and U. M. Sharma, “Impact Analysis of JellyFish Attack in MANETs,” ADBU Journal of Engineering Technology, vol. 4, Mar. 2016, [Online]. Available: https://journals.dbuniversity.ac.in/ojs/index.php/AJET/article/download/172/181.
  20. S. Desilva and R. V. Boppana, “Mitigating malicious control packet floods in ad hoc networks,” IEEE Wireless Communications and Networking Conference, 2005, vol. 4, pp. 2112–2117, doi: 10.1109/wcnc.2005.1424844.
  21. S. Deng, X. Gao, Z. Lu, and X. Gao, “Packet Injection Attack and Its Defense in Software-Defined Networks,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 3, pp. 695–705, Mar. 2018, doi: 10.1109/tifs.2017.2765506.
  22. C. Alocious, H. Xiao, and B. Christianson, “Analysis of DoS attacks at MAC Layer in mobile adhoc networks,” 2015 International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 811–816, Aug. 2015, doi: 10.1109/iwcmc.2015.7289187.
  23. V. Gupta, S. Krishnamurthy, and M. Faloutsos, “Denial of service attacks at the MAC layer in wireless ad hoc networks,” MILCOM 2002. Proceedings, vol. 2, pp. 1118–1123, doi: 10.1109/milcom.2002.1179634.
  24. Z. Wang et al., “A 37-GHz Asymmetric Doherty Power Amplifier With 28-dBm P sat and 32% Back-Off PAE in 0.1-μm GaAs Process,” IEEE Transactions on Microwave Theory and Techniques, vol. 70, no. 2, pp. 1391–1400, Feb. 2022, doi: 10.1109/tmtt.2021.3136510.
  25. R. H. Jhaveri and N. M. Patel, “Attack‐pattern discovery based enhanced trust model for secure routing in mobile ad‐hoc networks,” International Journal of Communication Systems, vol. 30, no. 7, May 2016, doi: 10.1002/dac.3148.
  26. Xiaobing Zhang, S. F. Wu, Zhi Fu, and Tsung-Li Wu, “Malicious packet dropping: how it might impact the TCP performance and how we can detect it,” Proceedings 2000 International Conference on Network Protocols, pp. 263–272, doi: 10.1109/icnp.2000.896310.
  27. R. Akbani, T. Korkmaz, and G. V. S. Raju, “HEAP: A packet authentication scheme for mobile ad hoc networks,” Ad Hoc Networks, vol. 6, no. 7, pp. 1134–1150, Sep. 2008, doi: 10.1016/j.adhoc.2007.11.002.
  28. S. Singh, A. Pise, O. Alfarraj, A. Tolba, and B. Yoon, “A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET,” Sustainable Cities and Society, vol. 79, p. 103483, Apr. 2022, doi: 10.1016/j.scs.2021.103483.
  29. Ming Yu, Mengchu Zhou, and Wei Su, “A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments,” IEEE Transactions on Vehicular Technology, vol. 58, no. 1, pp. 449–460, Jan. 2009, doi: 10.1109/tvt.2008.923683.
  30. H. Shokri-Ghadikolaei, C. Fischione, G. Fodor, P. Popovski, and M. Zorzi, “Millimeter Wave Cellular Networks: A MAC Layer Perspective,” IEEE Transactions on Communications, vol. 63, no. 10, pp. 3437–3458, Oct. 2015, doi: 10.1109/tcomm.2015.2456093.
  31. N. Veeraiah et al., “Trust Aware Secure Energy Efficient Hybrid Protocol for MANET,” IEEE Access, vol. 9, pp. 120996–121005, 2021, doi: 10.1109/access.2021.3108807.
  32. G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535–547, Mar. 2000, doi: 10.1109/49.840210.
  33. J. Chen, M. Yan, F. Zhu, J. Xu, H. Li, and X. Sun, “Fatigue Driving Detection Method Based on Combination of BP Neural Network and Time Cumulative Effect,” Sensors, vol. 22, no. 13, p. 4717, Jun. 2022, doi: 10.3390/s22134717.
  34. N. Li and S. K. Das, “A trust-based framework for data forwarding in opportunistic networks,” Ad Hoc Networks, vol. 11, no. 4, pp. 1497–1509, Jun. 2013, doi: 10.1016/j.adhoc.2011.01.018.
  35. Z. Xia, X. Mao, K. Gu, and W. Jia, “Two-Dimensional Behavior-Marker-Based Data Forwarding Incentive Scheme for Fog-Computing-Based SIoVs,” IEEE Transactions on Computational Social Systems, vol. 9, no. 5, pp. 1406–1418, Oct. 2022, doi: 10.1109/tcss.2021.3129898.
  36. J. Ni, X. Lin, and X. Shen, “Privacy-Preserving Data Forwarding in VANETs: A Personal-Social Behavior Based Approach,” GLOBECOM 2017 - 2017 IEEE Global Communications Conference, pp. 1–6, Dec. 2017, doi: 10.1109/glocom.2017.8254013.
  37. D. Singh, B. Kumar, S. Singh, and S. Chand, “SMAC-AS: MAC Based Secure Authentication Scheme for Wireless Sensor Network,” Wireless Personal Communications, vol. 107, no. 2, pp. 1289–1308, Apr. 2019, doi: 10.1007/s11277-019-06336-8.
  38. H. Sikarwar and D. Das, “A Novel MAC-Based Authentication Scheme (NoMAS) for Internet of Vehicles (IoV),” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 5, pp. 4904–4916, May 2023, doi: 10.1109/tits.2023.3242291.
  39. Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne:,” Proceedings of the 8th annual international conference on Mobile computing and networking - MobiCom ’02, 2002, doi: 10.1145/570646.570648.
  40. J. Alonso-Zárate, C. Crespo, Ch. Skianis, L. Alonso, and Ch. Verikoukis, “Distributed point coordination function for IEEE 802.11 wireless ad hoc networks,” Ad Hoc Networks, vol. 10, no. 3, pp. 536–551, May 2012, doi: 10.1016/j.adhoc.2011.09.004.
  41. T. D. Lagkas, D. G. Stratogiannis, and P. Chatzimisios, “Modeling and performance analysis of an alternative to IEEE 802.11e Hybrid Control Function,” Telecommunication Systems, vol. 52, no. 4, pp. 1961–1976, Jun. 2011, doi: 10.1007/s11235-011-9477-5.
  42. D. Djenouri and N. Badache, “On eliminating packet droppers in MANET: A modular solution,” Ad Hoc Networks, vol. 7, no. 6, pp. 1243–1258, Aug. 2009, doi: 10.1016/j.adhoc.2008.11.003.
  43. G. Liu, Z. Yan, and W. Pedrycz, “Data collection for attack detection and security measurement in Mobile Ad Hoc Networks: A survey,” Journal of Network and Computer Applications, vol. 105, pp. 105–122, Mar. 2018, doi: 10.1016/j.jnca.2018.01.004.
  44. D. Ergenç, L. Eksert, and E. Onur, “Dependability-based clustering in mobile ad-hoc networks,” Ad Hoc Networks, vol. 93, p. 101926, Oct. 2019, doi: 10.1016/j.adhoc.2019.101926.
  45. J. Guo et al., “ICRA: An Intelligent Clustering Routing Approach for UAV Ad Hoc Networks,” IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 2447–2460, Feb. 2023, doi: 10.1109/tits.2022.3145857.
  46. S. S. Manvi and S. Tangade, “A survey on authentication schemes in VANETs for secured communication,” Vehicular Communications, vol. 9, pp. 19–30, Jul. 2017, doi: 10.1016/j.vehcom.2017.02.001.
CRediT Author Statement

The authors confirm contribution to the paper as follows:

Conceptualization: Lyingluo Wang and Zhu Jiping; Methodology: Lyingluo Wang; Software: Zhu Jiping; Writing- Original Draft Preparation: Lyingluo Wang and Zhu Jiping; Visualization: Lyingluo Wang and Zhu Jiping; Investigation: Lyingluo Wang and Zhu Jiping; Supervision: Zhu Jiping; Writing-Reviewing and Editing: Lyingluo Wang and Zhu Jiping; All authors reviewed the results and approved the final version of the manuscript.

Acknowledgements

Author(s) thanks to Dr. Zhu Jiping for this research completion and support.

Funding

No funding was received to assist with the preparation of this manuscript.

Ethics Declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Availability of Data and Materials

Data sharing is not applicable to this article as no new data were created or analysed in this study.

Author Information

Contributions

All authors have equal contribution in the paper and all authors have read and agreed to the published version of the manuscript.

Corresponding Author



Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution NoDerivs is a more restrictive license. It allows you to redistribute the material commercially or non-commercially but the user cannot make any changes whatsoever to the original, i.e. no derivatives of the original work. To view a copy of this license, visit: https://creativecommons.org/licenses/by-nc-nd/4.0/

Cite this Article

Lyingluo Wang and Zhu Jiping, “Routing and MAC Layer based Framework for Secure and Reliable Communication in Mobile Ad Hoc Networks”, Journal of Computer and Communication Networks, pp. 061-071, 2025, doi: 10.64026/JCCN/2025007.

Copyright

© 2025 Lyingluo Wang and Zhu Jiping. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.