Project Proposal2 Correct
Project Proposal2 Correct
By
MAY, 2024
1
CHAPTER ONE 2
1.0 INTRODUCTION 2
1.1 Background to the Study 2
1.1.1 Intrusion Detection Systems 4
1.2 Statement of the problem 5
1.3 Aim and Objectives 6
1.4 Significance of the study 6
1.5 Scope of the study 7
1.6 Definition of Terms 8
LITERATURE REVIEW 11
2.0 Mobile Ad-hoc Network (MANET) 11
2.1 Applications of Mobile Ad-hoc Networks (MANETs) 11
2.2 Challenges in MANETs 11
2.3 Routing Protocols in Mobile Ad-hoc Networks 12
2.4 Types of Routing Protocols 13
2.5 Reviewed Works on MANET Routing Protocols 15
2.6 Reviewed Works on Security Challenges and Detection of Attacks in MANETs 19
CHAPTER THREE 28
Methodology 28
3.0 Introduction 28
3.1 Support Vector Machine 29
3.1.1 The key steps involved in using a Support Vector Machine (SVM) algorithm are: 29
3.2 Lightweight Cryptography 32
3.2.1 Types of Lightweight Cryptography commonly used in MANETS: 32
3.3 Process Of Asymmetric Encryption Like RSA 33
3.3.1 Steps For Lightweight Symmetric Algorithms 34
3.4 Network Simulator 3 35
3.4.1 Features Of Network Simulator 3 36
REFERENCES 38
2
CHAPTER ONE
1.0 INTRODUCTION
1.1 Background to the Study
Computer Networks have become a very important aspect in the technology development
because it promotes communication between people and businesses (Raheem, 2011).A computer
resources, such as files, printers, and internet connections and communicate with one another,
either through physical cables or wireless connections (Chauhan, 2023). A good example of
less networks that consist of mobile nodes without a centralized administration, (Praveen et al.,
emerged as a promising technology for various applications. These networks are particularly
scenarios, such as disaster response or military operations to smart cities and vehicular networks.
They also provide a flexible and dynamic communication environment, enabling nodes to
communicate directly with each other, forming a temporary network on-the-fly, (Conti &
Giordano, 2014).
MANET is autonomous system of nodes connected by wireless links that usually has a routable
networking environment on top of a Link Layer ad hoc network (Oyelakin, Agboola, Abdullahi
and Yusuf, 2020). Generally, this kind of network consists of a set of mobile nodes connected
MANET nodes are free to move randomly as the network topology changes frequently. Each
node behaves as a router as they forward traffic to other specified nodes in the network.
However, the decentralized and dynamic nature of MANETs presents numerous challenges,
3
especially in terms of routing and security (Bhatnagar, Gobi, Aqeel & Solanki, 2023). The
inherently dynamic and fluid nature of MANETs, along with their limited resources and lack of
permanent infrastructure, makes them vulnerable to numerous security challenges. These include
disruptions by malicious nodes (rogue nodes), Denial of Service (DoS) attacks, and advanced
attacks targeting routing protocols. Given these vulnerabilities, there is a pressing need for
creative solutions that can protect the integrity, confidentiality, and availability of data within
Routing is a fundamental aspect of MANETs, as it determines the path for data transmission
between nodes. Since there is no fixed infrastructure in MANETs, routing protocols play a
critical role in establishing efficient and reliable communication paths. Traditional routing
protocols designed for wired networks, such as the popular Internet Protocol (IP) routing
protocols, are not suitable for MANETs due to the unique characteristics of these networks,
including node mobility, limited resources, and frequent topology changes. Consequently,
several routing protocols have been proposed specifically for MANETs, aiming to optimize
routing performance, minimize overhead, and adapt to dynamic network conditions (Nithya,
Korir and Cheruiyot (2022), mentioned that in a MANET, nodes do not know the topology of
their network. Rather, they have to discover it by their own as the topology in the ad-hoc
network is dynamic topology. The basic rules is that a new node whenever enters into an ad-
hoc network, must announce its arrival and presence and should also listen to similar
announcement broadcasts made by other mobile nodes. MANETs exhibit a dual nature based on
the role of the node, which varies depending on whether it is a sender, receiver, or an
intermediate node that helps complete the network topology. Nodes acting as senders or
4
receivers are termed hosts, while those serving as intermediate nodes function as routers (Revath,
the following criteria: dynamic topology (Karthik et al.2010), limited Bandwidth- (Kumar &
Kumar, 2012), limited physical security (Kumar et al., 2012) and decentralized network control,
based systems by examining the behavioral patterns of network entities and identifying
intruder, causing most preventive security mechanisms to fail. The ability of IDS to adapt to the
network's dynamic characteristics and detect intrusions that conventional methods miss makes
these IDSs particularly promising for use in Mobile Ad-hoc Networks (MANETs), but they have
limitations such as high computational overhead and difficulty in detecting new types of attacks
Tartakovsky, Rozovskii, Blazek, and Kim (2006) define intrusion detection as the activity of
identifying and examining network intrusions by monitoring traffic for signs of security
breaches, which may be initiated by intruders. Intrusion Detection Systems (IDS) are described
as either software or hardware solutions designed to facilitate this process. Liao, Lin, and Tung
network behavior analysis, and mixed forms. According to Anthi, Slowinska, Theodorakopoulos,
and Burnap (2019), a basic IDS architecture includes sensors, an analysis engine, and a reporting
system. This setup allows for the collection and analysis of data, detection of network anomalies,
5
1.2 Statement of the problem
Mobile Ad-hoc Networks (MANETs) are increasingly critical in applications ranging from
network that introduce severe vulnerabilities. These rogue nodes can execute a variety of
through spoofing, and manipulating routing tables, which can cripple the network.
Current security measures for MANETs are often inadequate due to several intrinsic challenges.
First, the dynamic nature of MANETs, characterized by frequent changes in network topology
and node mobility, complicates the application of conventional security solutions that assume a
static network environment. Second, many existing security protocols either impose significant
overhead that degrades network performance or rely on centralized mechanisms that contradict
prevent identity spoofing attacks, leaving the network vulnerable to intrusions that exploit
This proposal aims to address these critical vulnerabilities by developing a novel approach to
detection and enhancing routing integrity. This approach will integrate robust identity
verification mechanisms to ensure that all participating nodes are authenticated and authorized,
thereby mitigating the risk of spoofing and other identity-related attacks. Additionally, the
proposed system will incorporate adaptive intrusion detection techniques that can dynamically
6
respond to new and evolving threats without imposing excessive computational or
communication overhead.
verification to detect and mitigate the impact of rogue nodes within MANETs.
3. To extensively test and validate the effectiveness of the proposed intrusion detection and
routing integrity mechanisms under various scenarios using network simulators like NS3
or OPNET.
4. To Apply Support Vector Machine to IDS in order to protect MANETs from emerging
approaches in terms of detection accuracy, false positive and false negative rates,
providing a more lightweight and energy-efficient approach. This initiative is part of broader
7
efforts to fortify MANETs against a variety of security threats, including rogue nodes, Denial of
Service (DoS) attacks, and routing attacks. The findings from this research are expected to offer
critical insights into the design and evaluation of identity-based security mechanisms,
particularly in environments where resources are limited. Furthermore, the outcomes of this
study could potentially inform the development of new security standards and best practices for
the results may attract interest from researchers in related fields such as wireless
Networks (MANETs) against rogue nodes through innovative identity-based intrusion detection
and routing integrity strategies. Firstly, a comprehensive literature review will be conducted to
examine existing intrusion detection systems and secure routing protocols. This review will
provide a foundational understanding of current methodologies and their limitations, setting the
Secondly, the study will involve the development and implementation of an advanced identity-
based intrusion detection system integrated with secure routing protocols. These security
measures will be designed to dynamically adapt to the changing topology and threat landscape of
MANETs. The implementation will be conducted within a simulated environment using network
Thirdly, extensive simulation experiments will be performed to evaluate the efficacy of the
proposed security framework. The performance of the intrusion detection system and secure
8
routing protocols will be assessed based on various metrics such as detection accuracy, routing
Furthermore, the results from these experiments will be meticulously analyzed to determine the
effectiveness of the proposed models in improving network security against rogue nodes. A
comparative analysis will also be conducted between the proposed security solutions and
Finally, the study will conclude with a comprehensive assessment of the proposed security
enhancements’ overall impact on MANET security. This will include discussions on potential
areas for future research and further development of the security protocols to accommodate
of wireless network that does not rely on a pre-existing infrastructure. Instead, nodes
within the network communicate directly with each other and dynamically establish
the network topology caused by node mobility (Praveen et al., 2022; Khudayer et
al.,2023).
ii. Rogue Node: In the context of network security, a rogue node refers to a network
device that is not authorized to be part of the network or has been compromised by
malicious actors. Such nodes can perform a variety of disruptive actions, including
iii. Intrusion Detection System (IDS): An Intrusion Detection System (IDS) is a software
9
malicious activities or policy violations. Any detected activity is typically reported to
iv. Routing Integrity: Routing integrity refers to the assurance that the path taken by data
entities. This concept is crucial in preventing routing attacks where malicious nodes
Rajendran, 2024).
access and control interactions. Identity-based security mechanisms are crucial for
vi. Denial of Service (DoS) Attack: A Denial of Service attack is a malicious attempt to
target or its surrounding infrastructure with a flood of Internet traffic. DoS attacks
exploit the specific capacity limits that apply to any network resources (Chen &
Kumar, 2021).
vii. Identity-based security: A security mechanism that uses digital certificates to verify
the identity of nodes in a network and to prevent unauthorized access (Wang, Song,
viii. Lightweight cryptography: Cryptographic algorithms and protocols that are designed
models to enable systems to learn from data and to improve their performance over
time.
xi. Simulation: The process of modeling the behavior of a system using computer
11
CHAPTER TWO
LITERATURE REVIEW
2.0 Mobile Ad-hoc Network (MANET)
MANET (Mobile Ad-hoc Network) is a combination of wireless mobile devices which interacts
with each other through radio communication (Nishi & Pooja, 2022). Wireless communication
employs radio technology to facilitate data transmission without any fixed infrastructures. A
mobile ad hoc network is an example of this data transmission technique, which comprises of
devices such as smart phones, laptops and printers. Some of the key features of mobile ad hoc
Cheruiyot., 2022).
mobile devices to connect without relying on any pre-established infrastructure or access point
(Karthik et al., 2010; Oyelakin et al., 2020). There are several scenarios in which MANET
technology can be deployed to solve a problem. For examples, some of the applications of
MANET include: Sensor Networks for environmental monitoring; rescue operations in remote
internetworking, Quality of Service and Security. Brief explanations are as outlined below:
(i) Routing: since the topology of the network is constantly changing, the issue of
routing packets between any pair of nodes becomes a challenging task. Furthermore,
12
multicast routing even imposes a bigger challenge because the multicast tree is no
longer static. This is due to the random movement of nodes within the network.
Routes between nodes may potentially contain multiple hops. Therefore, the design of
the protocol becomes even more complicated (Umesh, Mewada, Iaddhani & Bunkar,
2011).
(ii) Power Consumption: the routing protocol should take into consideration the limited
power resource of the mobile wireless nodes. In other words, the routing protocol
the routing protocol should take into consideration the coexistence of other routing
(iv) Quality of Service (QoS): Providing different quality of service levels in a constantly
(v) Security is another critical concern in MANETs, as these networks are vulnerable to
various attacks due to their open nature, lack of centralized control, and limited
resources. The absence of a fixed infrastructure and the presence of malicious nodes
network or over multiple networks, which to send and receive data. It directs the passing of
logically addressed packets from their source toward their ultimate destination through
intermediary nodes. Routing protocol is the routing of packets based on the defined rules and
regulations. Every routing protocol has its own algorithm on the basis of which it discovers and
13
maintains the route. Each routing protocol has a data structure which stores the information of
Figure 1 show the prominent way of classifying MANETs routing protocols. The protocols may
be categorized into two types, Proactive and Reactive. Other category of MANET routing
Reactive Proactive
Hybrid
Examples: Examples:
AODV, DSR, TORA DSDV, OLSR, WRP etc.
Examples:
ZRP
Thiagarajan,Ganesan, Anbarasu, Baskar, Arthi and Ramkumar (2021) carried out a study that
involved achieving optimised secure approach for the detection and isolation of malicious nodes
in MANET. The authors argued that the technique is efficient for the purpose it was designed
for. Oyelakin et al. (2020) investigated the performances of selected MANET routing algorithms
using a nomadic scenario.. Also, Alslaim, Alaqel and Zaghloul (2014) reported that a Mobile
Ad-hoc Network (MANET) consists of wireless mobile hosts forming a temporary network
14
without the need for standalone infrastructure or centralized administration. The study also
emphasized that the nodes in the network, due to their mobility, possess the ability to self-
organize and self-configure. Notably, these nodes serve not only as hosts but also perform the
functions of routers.
Dynamic Source Routing (DSR) is a pure reactive routing protocol which is based on the
concept of source routing. DSR protocol is composed of two important phases: route discovery
and route maintenance. DSR does not employ any periodic routing advertisement packets, link
status sensing or neighbor detection packets (Sultana et al., 2017). Therefore, the routing packet
overhead is less because of its on-demand nature. Due to dynamic nature of the MANET
operating environment, any route can fail anytime. Therefore, the route maintenance process will
constantly monitors the network and notify the other nodes with the help of route error packets as
well as route cache would be updated (Minhas, Mahmood & Malik, 2012). Raza, Umar, Qasim,
Ashraf and Irfan (2016) defined Mobile Ad-Hoc Network (MANET) as a wireless network
without any fixed infrastructure, comprising autonomous mobile nodes such as smartphones,
laptops, iPads, PDAs, and more. The network has a self-configuring ability to dynamically
reconstruct its topology and routing table information, allowing the exchange of data packets
Ad-hoc On-demand Distance Vector (AODV) algorithm is pure reactive in nature and it contains
the properties of both DSR and DSDV protocols. AODV algorithm is an improvement on DSDV
in the sense that it minimizes the number of broadcasts. AODV borrows the concept of hop by
hop routing, sequence numbers, periodic beacon messages from DSDV protocol (Sultana et al.,
2017). When a node wants to send a message to destination node, first it will check whether it
has a valid route to the destination or not. If not, then it broadcast a route request packet (RREQ)
15
to its neighbors which then forwards the request to their neighbors and so-on, until either it
reaches to the intermediate node which has a valid route for the destination or the destination
node. In AODV, once the route request has reached the destination or an intermediate node with
a valid route, the destination/intermediate node responds by unicasting a route reply (RREP)
message back to the neighbor node from which it first received the RREQ (Minhas et al., 2012).
Sunil and Ashwani (2010) provided an overview of various on demand/reactive routing protocols
Dynamic Source Routing, Ad-hoc On-demand Distance Vector and Temporary Ordered Routing
Protocol (DSR, AODV and TORA) by presenting their characteristics, functionality, benefits and
limitations and then makes their comparative analysis so to analyze their performance. It was
observed that the performance of all protocols studied was almost stable in sparse medium with
low traffic. The claim was that TORA performs much better in packet delivery owing to
management. Asymmetric key cryptography is used, which involves two specialized nodes,
labeled the Calculator Key (CK) and the Distribution Key (DK). The authors argued that these
two nodes are responsible for the generation, verification, and distribution of secret keys.Kumar
and Singla (2022) carried out a performance analysis of Optimized ACO-AOMDV Routing
Protocol with AODV and AOMDV in MANET scenarios. The work focused on measuring the
performances of the optimized ACO-AOMDV routing algorithms and the existing AODV and
AOMDV ones. It reported that the optimized one out-performed the other two.
Revath, Karpagavall, and Jullet (2020) proposed a Hybrid Approach for Cost-Effective Routing
and Security in MANETs, utilizing BSSO-DSR and AES-ECC Algorithms. The study
16
emphasized the utilization of the DSR-BSSO-MANETs algorithm, which efficiently identifies
balancing through the BSSO clustering algorithm. The research successfully identified blackhole
attacks using the MND-TX/RX Mechanism. Results from the study concluded that the DSR-
David, Cordova, Alexandre, Nguyen, Mai, and Guy (2020) introduced a system called Block
graph, designed to advocate for the integration of blockchain technology into mobile ad hoc
networks. This platform facilitates the deployment of ad hoc networks to facilitate transactions
Oyelakin et al. (2020) conducted a study comparing MANET routing protocols within a
network performance within such contexts. The researchers utilized simulations to explore the
nomadic settings. The study concentrated on scenarios where nomadic communities require
conditions. Comparative analysis focused on the DSDV and AODV algorithms in this particular
Kwan-Wu, John, Aidan, and Rogar (2019) the study shared experiences implementing and
deploying MAD-HOC's AODV and DSDV protocols for MANETs. The study identified key
17
challenges including managing unreliable links, reducing reliance on topology-specific
parameters, optimizing handoff mechanisms, and minimizing packet loss, as well as integrating
neighbor discovery and filtering. The authors emphasized the critical role of neighbor selection
in MANET routing protocols and advocated for adaptive parameter adjustments and proactive
route construction based on signal strength. The study proposed the development of a neighbor
selection sub-layer with diverse metrics, filters, and heuristics to enhance MANET routing.
Thiagarajan and Moorthi (2017) discussed different routing approaches. The study introduced
Optimized Link State Routing (OLSE), a dynamic and secure routing method aimed at
enhancing routing efficiency. OLSE functions as a proactive routing protocol utilizing periodic
metrics, providing effective outcomes in handling network congestion and boosting throughput.
The proposed mechanism underwent evaluation via simulation software, confirming its
19
neighbor
discovery and
filtering
Thiagarajan and Efficient routing The study Effective Periodic flooding,
Moorthi (2017) protocols for conducted routing outcomes in increased
mobile ad hoc in ad hoc handling network overhead and
network networks, congestion and reduced scalability
employing a enhancing data
dynamic source transmission rates
routing scheme to
transmit data from
source to receiver
nodes
team-centered rekey control framework incorporating a grouping component that partitions the
network into smaller groups via group clusters. This method effectively addresses privacy
20
concerns by utilizing rekeying to update shareable keys, facilitating both forward and reverse
privacy. The periodic beacon signals transmitted by team members aid in detecting and
preventing node replication attacks within the sensor field. Experimental findings illustrate that
the proposed system surpasses the current model in terms of power efficiency, privacy level, key
Ghodichor et al. (2023) investigated methods for enhancing the security of MANETs against
characterized by their lack of infrastructure and dynamic topology, are susceptible to various
attacks. The proposed SRA, incorporating blockchain technology, verifies nodes and safeguards
both data and control flow. The research demonstrates that this approach enhances MANET
security, reduces delay, and improves parameters such as packet delivery ratio, throughput, and
end-to-end delay. The research indicated that future research will explore additional applications
of blockchain in MANETs. Meanwhile, Korir et al. (2022) conducted a survey on the security
challenges inherent in current MANET routing protocols, providing valuable insights into
Nishi and Pooja (2022) argued that MANETs commonly encounter numerous security
vulnerabilities due to their inherent decentralized nature. This characteristic renders mobile
Black hole, Gray Hole, Wormhole, flooding, and sinkhole attacks, which disrupt packet routing
and diminish network performance. MANETs utilize several routing protocols such as AODV,
DSR, DSDV, and ZRP. Additionally, it has been noted that MANETs face limitations including
21
Srilakshmi, Alghamdi, Vuyyuru, Veeraiah, and Alotaibi (2022) introduced a Secure
Optimization Routing Algorithm tailored for Mobile Ad Hoc Networks (MANETs). This
algorithm leverages optimization techniques to enhance routing efficiency and ensure secure,
trust-based, and energy-efficient navigation within MANETs. The approach employs fuzzy
clustering to designate Cluster Heads (CHs) based on indirect, direct, and recent trust
evaluations, while value nodes are identified according to their trust ratings. Subsequently, CHs
facilitate multi-hop routing through the designated protocol, selecting optimal routes considering
Sivapriya and Mohandas (2022) presented a comprehensive overview of topics that have been
communication protocol stack. The article also outlines potential research directions for
developing future security systems for MANETs and related application paradigms.Thiagarajan,
Ganesanb, Baskar, and Ramkumar (2021) proposed a system for detecting and isolating
malicious nodes in MANETs. Upon detection, the malicious node is isolated and discarded, and
an alternative path is established using various techniques. The system employs an algorithm for
enabling multipath reliable routing, discovering paths for a group of nodes, and reorganizing
Khan, Chawhan, Mushrif, and Neole (2021) devised a mechanism to evaluate the performance of
the Ad hoc On-demand Distance Vector Protocol (AODV) under the influence of Black hole,
Gray hole, and Worm hole attacks in MANETs. The research proposed a security mechanism
based on two techniques: cryptography-based and trust-based. While cryptography offers greater
accuracy, it consumes more energy and time for attack detection and prevention compared to
22
trust-based techniques. Trust-based methods, although more energy and time efficient, may not
always provide accurate detection, especially for multiple attacks. The researchers suggested that
this technique is not efficient for multiple attacks and may be suitable for specific types of
attacks.
Khalifa, Nuri, and Ali (2021) proposed an Intrusion Detection System (IDS) utilizing three
Machine Learning (ML) techniques: Random Forest (RF), Support Vector Machines (SVM), and
Naive Bayes (NB). These algorithms were employed to classify nodes in MANETs utilizing the
Dynamic Source Routing (DSR) protocol. The Random Forest algorithm exhibited the highest
accuracy in experimental research. SVM, a supervised learning technique, identifies patterns for
Regassa and Yeom (2021) implemented an IDS mechanism alongside the OLSR protocol to
effectively detect misbehaving nodes in MANETs. The mechanism validates the path and
identifies attackers, isolating them through an alternative path for End-to-End communication.
While this approach introduces some network overhead, it significantly enhances network
security. Future research directions include evaluating the routing protocol and developing
Ahmed, Sundaram, and Karthika (2021) introduced the rushing attack in the AOMDV multicast
routing protocol, highlighting its detrimental impact on MANET performance. Subsequently, the
research implemented a prevention mechanism based on time threshold and random route
selection techniques. The research asserted that the rushing attack involves nodes transmitting
excessive route requests with higher transmission power, disrupting data transmission. The
23
prevention mechanism effectively safeguarded the network, enhancing throughput, packet
delivery ratio, and reducing end-to-end delay compared to the attacked AOMDV routing
protocol. The research noted that this method does not necessitate additional external resources,
Pooja, Kavita, and Gia (2020) proposed a protective mechanism against dual attacks in
MANETs, focusing on Black Hole and Gray Hole attacks. The approach involved leveraging the
concept of Artificial Neural Network (ANN) as a deep learning algorithm alongside the swarm-
based Artificial Bee Colony (ABC) optimization technique. The ABC optimization technique
simulates the intelligent behavior of honeybees and categorizes network nodes into two lists:
healthy nodes and affected nodes. Affected nodes are further categorized into BHA nodes and
GHA nodes. ANN is then utilized to train the network using these categorized properties. The
network's performance was evaluated based on parameters such as Packet Delivery Ratio (PDR),
throughput, and delay. Results demonstrated significant improvements in PDR, throughput, and
delay when employing the swarm-based Artificial Bee Colony (ABC) optimization technique for
Deepak, Nisha, Sunil, and Sudesh (2020) conducted an analysis and comparison of the ant
colony optimization algorithm with DSDV, AODV, and AOMDV, focusing on finding the
shortest path in MANETs. In a similar vein, Swarm Intelligence (SI) techniques, including Ant-
Colony Optimization (ACO) and Particle Swarm Optimization (PSO), are employed to discover
optimal communication paths among nodes. The protocol is optimized to select the most
efficient path, thereby extending communication availability. These SI-based methods address
various routing challenges and offer enhancements in packet delivery speed, throughput, power
24
Prasath and Sreemathy (2019) investigated the performance of the optimized Dynamic Source
Routing protocol (DSR) for MANETs. The research utilized the Firefly algorithm to adapt the
conventional DSR algorithm and determine the best routes between communication nodes. The
proposed technique enhanced DSR routing performance by employing the Firefly algorithm to
facilitate well-coordinated packet transfers from source to destination nodes. The optimal path
selection was based on factors such as link quality, node mobility, and end-to-end
Vector Routing Protocol, designed to minimize control packet volume by reducing intermediary
nodes in the route discovery process. It utilizes queue length to manage route request (RREQ)
broadcasts, resulting in improved Quality of Service (QoS) metrics and network longevity
compared to AODV.Ravilla and Reddy (2016) explored the use of the Secured Hash Algorithm
(SHA3-256) for secured routing in MANETs employing the Hybrid Routing Technique. The
Hashed Message Authentication Code (HMAC) was implemented to ensure data integrity and
authenticity. The Zone Routing Protocol (ZRP) was utilized as the hybrid routing method
25
(2022) MANETs commonly attacks like Black mechanisms are security attacks,
encounter hole, Gray Hole, been proposed to scalability issues,
numerous security Wormhole, reduce or minimize and security
vulnerabilities due the attacks. vulnerabilities.
flooding, and
to their inherent
sinkhole attacks
decentralized
disrupt packet
nature.
routing and
reduce network
performance.
Srilakshmi, A Secure The approach Routing efficiency Network overhead
Alghamdi, Optimization employs fuzzy and trust-based
Vuyyuru, Veeraiah, Routing Algorithm clustering to security
and Alotaibi (2022) tailored for Mobile designate Cluster
Ad Hoc Networks Heads (CHs) based
(MANETs). on indirect, direct,
and recent trust
evaluations, while
value nodes are
identified according
to their trust ratings
Sivapriya and A comprehensive The effort led to Potential research
Mohandas (2022) overview of topics the identification directions for
discussed on of elements developing future
MANETs Security security systems for
contributing to MANETs and
threat scenarios, a application
summary of paradigms.
network security
requirements, and
the categorization
of attacks based
on the
communication
protocol stack
Khan, Chawhan, a mechanism to Cryptography-based Offer greater Consumes energy
Mushrif, and Neole evaluate the and trust-based Accuracy and time, not
(2021) performance of the efficient for
Ad hoc On-demand multiple attacks.
Distance Vector
Protocol (AODV)
under the influence
of Black hole, Gray
hole, and Worm
hole attacks in
MANETs.
Khalifa, Nuri, and An Intrusion RF to classify Accuracy, better Network overhead
Ali (2021) Detection System nodes, SVM to predictive
(IDS) utilizing three identify patterns and performance,
Machine Learning NB to minimize handle multiple
(ML) techniques: data set. classes.
Random Forest
(RF), Support
Vector Machines
(SVM), and Naive
26
Bayes (NB).
Regassa and Yeom An IDS mechanism The mechanism It enhanced network It introduced
(2021) alongside the OLSR validates the path security overhead in network
protocol to and identifies traffic
effectively detect attackers, isolating
misbehaving nodes them through an
in MANETs alternative path for
End-to-End
communication.
Ibrahim, Ahmed, Rushing attack in prevention Effective safeguard Network overhead
Sundaram, and the AOMDV mechanism based the network,
Karthika (2021) multicast routing on time threshold throughput, packet
protocol, and random route delivery ratio
highlighting its selection
detrimental impact techniques.
on MANET
performance.
Pooja, Kavita, and A protective Artificial Neural Improvements in
Gia (2020) mechanism against Network (ANN) and PDR, throughput,
dual attacks in Swarm-based and delay
MANETs, focusing Artificial Bee
on Black Hole and Colony (ABC)
Gray Hole attacks.
Deepak, Nisha, An analysis and Swarm Intelligence packet delivery various routing
Sunil, and Sudesh comparison of the (SI) techniques; speed, throughput, challenges
(2020) ant colony Ant-Colony power efficiency,
optimization Optimization (ACO) and packet delay
algorithm with and Particle Swarm
DSDV, AODV, and Optimization (PSO)
AOMDV
Prasath and The performance of Firefly algorithm Reduced packet
Sreemathy (2019) the optimized volumes
Dynamic Source
Routing protocol
(DSR) for
MANETs.
Table3: Review of related work on security in MANETs in tabular form
Methodology
3.0 Introduction
This chapter described all the research process require to achieve all objectives listed in chapter
one. Each step of the methodology is logically detailed corresponding with the activities to
Methodology Plan
30
Lightweight Support Vector Machine (SVM) in Mobile Ad hoc Networks (MANETs) involves
dimensional space that maximizes the margin between different classes of data points. SVMs
were developed in the 1990s by Vladimir N. Vapnik and his colleagues. They are widely used in
machine learning for their ability to handle both linear and nonlinear classification problems.
SVMs distinguish between classes by finding the best decision boundary, known as the
hyperplane, which maximizes the margin between the closest data points of different classes.
Support vectors are the data points that determine this maximal margin. When data is not linearly
separable, SVMs use kernel functions to transform the data into a higher-dimensional space for
linear separation, a technique known as the "kernel trick." Popular kernel functions include
linear, polynomial, radial basis function (RBF), and sigmoid kernels. SVMs are powerful tools
with applications in various fields like healthcare, natural language processing, signal processing,
3.1.1 The key steps involved in using a Support Vector Machine (SVM) algorithm are:
I. Prepare the data
Data acquisition: training data will be gathered from Kaggle repository, which will
consists of input features (x) and corresponding labels (y) indicating the class or category.
Data Preprocess: this will process and scale the input features as needed. It helps the
31
II. Kernel function: The kernel function maps the input data into a higher-dimensional
feature space, allowing the SVM to find a linear separator (hyperplane) in that space.
Common kernel functions include linear, polynomial, radial basis function (RBF), and
sigmoid. The choice of kernel function depends on the complexity of the data and the
problem at hand.
III. SVM model: The SVM algorithm will train the model by finding the optimal hyperplane
that maximizes the margin between the data points of different classes. This is done by
solving a quadratic optimization problem using techniques like Lagrange multipliers. The
data points that lie closest to the hyperplane and influence its position are called support
vectors.
IV. Evaluate the model: Assess the performance of the trained SVM model on a separate test
dataset Metrics like accuracy, precision, recall, and F1-score can be used to evaluate the
model's performance.
V. Tune the hyperparameters: SVM has hyperparameters that can be tuned to improve its
performance, such as the regularization parameter (C) and the kernel parameters.
Techniques like grid search or cross-validation can be used to find the optimal
hyperparameter values.
VI. Use the trained model for prediction: Once the SVM model is trained and tuned, it can be
used to classify new, unseen data points into the appropriate classes.
32
figure 3 show the architectural representation of SVM for the proposed system
Start
The kernel function will map the input data into a higher
-dimensional feature space (Feature Extraction)
YES
SVM Model
Implement Model
Stop
33
3.2 Lightweight Cryptography
lightweight cryptography for Mobile Ad-Hoc Networks (MANETs) is essential due to the
i. Stream Ciphers: Stream ciphers like RC4, HC-128, or Grain are often preferred in
implementations.
ii. Block Ciphers: Lightweight block ciphers such as PRESENT, KATAN, or SIMON
i. Cryptographic hash functions like MD5, SHA-1, or SHA-256 are used for integrity
i. ECC offers strong security with shorter key lengths compared to traditional
MANETs. ECC variants like ECDSA (Elliptic Curve Digital Signature Algorithm)
i. IBC eliminates the need for certificates by using user identities directly as public keys,
34
V. Group Key Management:**
i. Lightweight group key management schemes such as those based on key trees or
These schemes aim to minimize overhead while providing efficient key distribution and
management.
public key is shared with others, while the private key is kept secret. In RSA, this
involves selecting two large prime numbers, computing their product (the modulus), and
Key Distribution: Share the public key with parties that need to encrypt data to send to
you securely. The private key should be securely stored and not shared with anyone.
Data Encryption: To send a message securely, the sender obtains the recipient's public
key and uses it to encrypt the message. This is typically done using padding schemes to
enhance security.
channel. Asymmetric encryption is often used for key exchange in secure communication
Data Decryption: Upon receiving the encrypted message, the recipient uses their private
key to decrypt the message and recover the original plaintext. This process ensures that
only the intended recipient, who possesses the corresponding private key, can decrypt the
message.
Authentication and Integrity: Asymmetric encryption can also be used for digital
signatures. The sender can use their private key to create a digital signature for a
35
message, which can be verified by anyone with access to the sender's public key. This
Key Management: Proper management of public and private keys is essential. This
includes securely storing private keys, rotating keys periodically, and revoking
compromised keys.
MANETs.
Identify the most relevant features for classification or regression tasks in MANETs,
considering factors such as node mobility, link quality, energy levels, and network
topology.
or feature selection algorithms to reduce the dimensionality of the feature space and
Choose a lightweight variant of SVM suitable for MANETs, such as LinearSVC for
Consider the computational efficiency, memory footprint, and scalability of the chosen
algorithm, as well as its ability to handle dynamic data and limited resources.
36
Collect and preprocess data relevant to the MANET application, including network traffic
Preprocess the collected data to handle missing values, outliers, and noise, and normalize
Model Training:
Train the lightweight SVM model using the training data, optimizing hyperparameters as
dynamic environments.
Model Evaluation:
Evaluate the trained lightweight SVM model's performance on the testing data using
appropriate evaluation metrics such as accuracy, precision, recall, F1-score, or area under
Validate the model's performance under realistic MANET conditions, considering factors
Integrate the trained lightweight SVM model into the MANET environment, ensuring
Implement mechanisms for real-time data collection, feature extraction, and model
37
3.4 Network Simulator 3
Network Simulator version 3, NS-3, is a new simulator that is intended to eventually replace the
aging NS-2 simulator. NS-3 officially started around mid 2006, and the first stable version was
released in June 2008, containing models for TCP/IP, WiFi, OLSR, CSMA (Ethernet), and point-
to-point links, “GOD routing”, among others. Additional stable versions have been subsequently
released, including Python bindings, learning bridge, and real-time scheduler for version 3.2
(Sep. 2008), emulation, ICMP, and IPv6 addresses in NS3.3 (Dec. 2008), WiFi improvements,
object naming system, and “tap bridge” in NS-3.4 (Apr. 2009). Even though NS-2 still has a
greater number of models included in the distribution, NS-3 has a good development momentum
and is believed to have a better core architecture, better suited to receive community
contributions. Core architecture features such as a COM-like interface aggregation and query
model, automatic memory management, callback objects, and realistic packets, make for a
reportedlyArtner, Lehn and Wehrle (2009)one of the better performing simulation tools available
till today.
ns-3 Object class, which introduces additional features like the attribute system and
object aggregation
Node object. Various components of a node are also represented as objects and are
associated with the node. For instance, in a simulation where a laptop is depicted as a
node, the WiFi radio component would be represented as an object installed on it.
38
OBJECT AGGREGATION: NS-3 facilitates the attachment of objects to nodes through
object aggregation, which allows the addition of diverse objects to a node at runtime
without altering the node class itself. However, a node can only have one instance of an
object from any given class. In the energy management framework described, object
ATTRIBUTE SYSTEM: Another crucial aspect of ns-3 is its attribute system. This
system enables users to alter specific simulation parameters by setting the attributes of
objects, thus avoiding direct modifications to class source code. This is accomplished
through high-level simulation scripts. In the context of our energy framework, attributes
such as the initial energy and supply voltage of an Energy Source are set this way.
Simulator Class: the management and timing of simulation events in ns-3 are handled by
39
REFERENCES
Alslaim, M. N., Alaqel, H. A., & Zaghloul, S. S. (2014). A comparative study of MANET
routing protocols. In The Third International Conference on e-Technologies and
Networks for Development (ICeND2014) (pp. 178-182) , IEEE.
Avinash, J. (2024). Routing and Security Based Ad-hoc Networks Configuration for
Identification of Attack Using Reinforcement Learning Approach.
Bhatnagar, G., Gobi, N., Aqeel, H., & Solanki, B. S. (2023). Sparrow-based Differential
Evolutionary Search Algorithm for Mobility Aware Energy Efficient Clustering in
MANET Network. International Journal of Intelligent Systems and Applications in
Engineering, 11(8s), 135-142.
Bisen, D., Mishra, S., Saurabh, P.: K-Means Based Cluster Formation and Head Selection
Through Artificial Neural Network in MANET (2021). https://doi.org/10.21203/rs.3.rs-
667651/v1
Chatterjee, B., Saha, H.N.: Parameter Training in MANET using Artificial Neural Network. Inte.
J. Compu. Net. Inf. Secur, 11(9), pp. 1–8 (2019).
https://doi.org/10.5815/ijcnis.2019.09.0112 H. Khalfaoui et al.
Conti Marco & Giordano Silvia (2007).Multihop Ad Hoc Networking: The Reality,IEEE
Communications Magazine 45(4):88 – 95, Follow journal, DOI:
10.1109/MCOM.2007.343617,IEEE Xplore
David Alexis, Cordova Morales, Alexandre Laube, Nguyen Thi, Mai Trang, Guy Pujolle (2020).
Blockgraph: A blockchain for mobile ad hoc networks. In 2020 4th cyber security in
networking conference (CSNet) (pp. 1-8). IEEE.
Deepak Sinwar, Nisha Sharma, Sunil Maakar& Sudesh Kumar (2020). Analysis and comparison
of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on
shortest path in MANET, Journal of Information and Optimization Sciences 41(2):621-
632, DOI: 10.1080/02522667.2020.1733193
Dilli, R., & Reddy, P. C. S. (2016, October). Implementation of security features in MANETs
using SHA-3 standard algorithm. In 2016 International Conference on Computation
System and Information Technology for Sustainable Solutions (CSITSS) (pp. 455-458).
IEEE.
E. Anthi, L. Williams, M. Słowińska, G. Theodorakopoulos and P. Burnap, “A supervised
intrusion detection
Ghasemnezhad, S., Ghaffari, A.: Fuzzy logic based reliable and real-time routing protocol for
mobile ad hoc networks. Wireless Personal Communications, 98(1), pp. 593–611 (2018).
https://doi.org/10.1007/s11277-017-4885-9
Ghodichor, N., Sahu, D., Borkar, G., & Sawarkar, A. (2023). Secure Routing Protocol To
Mitigate Attacks By Using Blockchain Technology In Manet. arXiv preprint
arXiv:2304.04254.
40
Goswami M. M., (2017) “AODV based adaptive distributed hybrid multipath routing for mobile
AdHoc network,” in Proc. International Conference on Inventive Communication and
Computational Technologies, pp. 410-414.
Hiremath, P.S., Anuradha, T., Pattan, P.: Adaptive fuzzy inference system for detection and
prevention of cooperative black hole attack in MANETs. In 2016 International
Conference on Information Science (ICIS). IEEE, pp. 245–251 (2016).
https://doi.org/10.1109/INFOSCI.2016.7845335
Ibrahim H. A., Ahmed A. S., Sundaram B. B., Karthika P., (2021), Prevention of Rushing Attack
in AOMDV using Random Route Selection Technique in Mobile Adhoc Network,
Proceedings of Fifth Int. Conf. on Electronics, Communication and Aerospace Tech.
(ICECA2021) IEEE.
Kalimuthu, V.K., Samydurai, G.: Fuzzy Logic Based DSR Trust Estimation Routing Protocol for
MANET Using Evolutionary Algorithms. Tehnickivjesnik/Technical Gazette, 28(6),
2006–2014 (2021). https://doi.org/10.17559/TV-20200612102818
Karthik S, Kannan S., Arunachalam V. P., Ravichandran T., and Valarmathi M. L..(2010).An
investigation about performance comparison of multihop wireless ad-hoc network routing
protocols in MANET, International Journal of Computer Science Issues(IJCSI), 7(3), pp.
35— 41.
Kaushik, P.: An Improved Black Hole Detection and Prevention Mechanism in MANET using
Firefly and Neural Network. Inte. J. Innov. Sci. Rese. Techn, 6(10) (2021)
Khalfaoui, H., Farchane, A., & Safi, S. (2022, May). An Overview of the Security Improvements
of Artificial Intelligence in MANET. In International Conference on Cybersecurity,
Cybercrimes, and Smart Emerging Technologies (pp. 135-146). Cham: Springer
International Publishing.
Khalifa M. M., Nuri O., Ali Alheeti K. M., (2021).New Intrusion Detection System to Protect
MANET Networks Employing Machine Learning Techniques, International Conference
of Modern Trends in Information and Communication Tech. Industry (MTICTI) IEEE.
Khan A. U., Chawhan M. D., Mushrif M. M., Neole B., (2021).Performance Analysis of Adhoc
On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and
Worm-Hole Attacks in Mobile Adhoc Network, Proceedings of the Fifth Int. Conf. on
Intelligent Computing and Control Systems (ICICCS 2021), IEEE Xplore Part Number:
CFP21K74-ART; ISBN: 978-0-7381-1327-2.
Khudayer, B. H., Alzabin, L. R., Anbar, M., Tawafak, R. M., Wan, T. C., AlSideiri, A., ... & Al-
Amiedy, T. A. (2023). A Comparative Performance Evaluation of Routing Protocols for
Mobile Ad-hoc Networks. International Journal of Advanced Computer Science and
Applications, 14(4).
Korir, F., & Cheruiyot, W. (2022). A survey on security challenges in the current MANET
routing protocols. Global Journal of Engineering and Technology Advances, 12(01), 078-
091.
41
Kumar S., and Kumar J. (2012).Comparative analysis of proactive and reactive routing protocols
in mobile ad-hoc networks (MANET), Journal of Information and Operations
Management, 3(1), pp. 92—95.
Kumar V. and Singla S., (2022). Performance Analysis of Optimized ACO-AOMDV Routing
Protocol with AODV and AOMDV in MANET, in Advances in Computing and Data
Sciences: 6th International Conference, ICACDS 2022, Kurnool, India, April 22–23,
2022, Revised
Kwan-Wu Chin, John Judge, Aidan Williams & Roger Kermode Sydney (2019). Networks and
Communications Lab Motorola Australia Research Centre 12 Lord St, Botany, NSW,
Australia {kwchin, johnj, aidan, rkermode}@arc.corp.mot.com
Luong, N.T., Vo, T.T., Hoang, D.: FAPRP: A machine learning approach to flooding attacks
prevention routing protocol in mobile ad hoc networks. Wireless Communications and
Mobile Computing, 2019, pp. 1–17 (2019). https://doi.org/10.1155/2019/6869307
M. M. Khalifa, O. Nuri, K. M. Ali Alheeti, (2021), “New Intrusion Detection System to Protect
MANET Networks Employing Machine Learning Techniques,” Int. Conf. of Modern
Trends in Information and Communication Tech. Industry (MTICTI) IEEE.
Mamood, A., & Zengin, A. (2021). Performance Evaluation of MANET Routing Protocols
AODV and DSDV Using NS2 Simulator. Sakarya University Journal of Computer and
Information Sciences, 4(1), 1-10.
Minhas, H. Mahmood, & H. Malik,(2012). Incentive driven cooperation to avoid packet loss in
multihop ad hoc networks, in 2012 International Conference on Emerging Technologies,
2012, 1–6.
Murugesan, P., Chelladurai, C. C., Kuluchamy, P., & Rajendran, U. SECURING MOBILE AD-
HOC NETWORKS USING ROBUST SECURED IPS ROUTING APPROACH
THROUGH ATTACK IDENTIFICATION AND ELIMINATION IN MANETS (2024).
Murugeshwari B., Saral Jeeva Jothi D., Hemalatha B.,Neelavathy Pari S. (2023).Trust Aware
Privacy Preserving Routing Protocol for Wireless Adhoc Network, International Journal
of Engineering Trends and Technology Volume 70 Issue 9, 362-370, September 2022,
ISSN: 2231 – 5381 / https://doi.org/10.14445/22315381/IJETT-V70I9P236 © 2022
Seventh Sense Research Group®
Nithya, R., Amudha, K., Musthafa, A. S., Sharma, D. K., Ramirez-Asis, E. H., Velayutham,
P., ... &Sengan, S. (2022). An optimized fuzzy-based ant colony algorithm for 5G-
MANET. Computers, Materials & Continua, 70(1), 1069-1087.
Oyelakin A.M. & Jimoh R.G. (2018). Simulation of Mobile Ad-hoc Network and its
Applicability in Academic Scenario, in proceedings of 10thiSTEAM Multi-Disciplinary
Conference, February,2018 Conference, Delta State Polytechnic, Ogwuashi-uku, Delta State,
Nigeria,679-687
42
Oyelakin, A. M., Yusuf, S. A., Agboola, R. O., & Abdullahi, F. (2020). A Study on The
Comparative Analysis Of MANET Routing Protocols In Nomadic Community Scenario.
Amity Journal of Computational Sciences (AJCS) Volume 4 Issue 1 ISSN: 2456-6616.
Pandey, K., & Swaroop, A. (2011). A comprehensive performance analysis of proactive, reactive
and hybrid manets routing protocols. arXiv preprint arXiv:1112.5703.
Pooja Rani, Kavita, Sahil Verma and Gia Nhu Nguyen, (2020), Mitigation of Black Hole and
Gray Hole Attack Using Swarm Inspired Algorithm with Artificial Neural Network,
IEEE.
Prasath, N., &Sreemathy, J. (2019). Optimized dynamic source routing protocol for MANETs.
Cluster Computing, 22(Suppl 5), 12397-12409.
Praveen Bondada, Debabrata Samanta Manjit , Kaur Kaur& Heung-No Lee (2022).Data
Security-Based Routing in MANETs Using Key Management Mechanism, January 2022,
Applied Sciences, 12(3):1041,DOI: 10.3390/app12031041
Raheem Ali H. (2011). Security Issues in Mobile Ad-Hoc Network and
Solutions,Telecommunication Systems, 1-6
Raza, N., Umar Aftab, M., Qasim Akbar, M., Ashraf, O., & Irfan, M. (2016). Mobile ad-hoc
networks applications and its challenges. Communications and Network, 8(03), 131-136.
Regassa D., Yeom H. Y., Son Y., (2022), Efficient Attacker Node(s) Detection and Isolation
Schemes in MANETs OLSR Protocol, Int. Conf. on Information Networking (ICOIN)
IEEE.
Revathi, P., Karpagavalli, N., & Angel, K. J. C. A Hybrid Approach For Cost-Effective Routing
And Security For Manets Using BSSO-DSR And AES-ECC Algorithms.
Sbai, O., El boukhari, M.: Data Flooding Intrusion Detection System for MANETs Using Deep
Learning Approach. In Proceedings of the 13th International Conference on Intelligent
Systems: Theories and Applications, pp. 1–5 (2020).
https://doi.org/10.1145/3419604.3419777
Sivapriya, N., & Mohandas, R. (2022). Analysis on Essential Challenges and Attacks on
MANET Security Appraisal. Journal of Algebraic Statistics, 13(3), 2578-2589.
Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure
optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-
14269.
Sultana Jeenat& Ahmed Tasnuva (2017).Securing AOMDV protocol in mobile adhoc network
with elliptic curve cryptography, 2017 International Conference on Electrical, Computer
and Communication Engineering (ECCE), February 2017, DOI:
10.1109/ECACE.2017.7912964
Sun .Z, Wei M., Zhang .Z., and Qu .G (2019).Secure Routing Protocol based on Multi-Objective
Ant-colony-optimization for wireless sensor networks, Appl. Soft Comput. J., vol. 77, pp.
366–375.
43
system for smart home IoT devices,” IEEE Internet of Things Journal, vol. 6, no. 5, pp. 9042–
9053, 2019
Thakker, V. M., Reddy, G. M., Kumar, K. V., & Moses, D. (2018). Choosing optimal routing
protocol by comparing different multipath routing protocols in mobile Adhoc networks.
In 2018 2nd International Conference on Inventive Systems and Control (ICISC) (pp.
1284-1290). IEEE.
Thiagarajan R. and M. Moorthi,( 2017). Efficient routing protocols for mobile ad hoc network,”
in Proc. Third International Conference on Advances in Electrical, Electronics,
Information, Communication and Bioinformatics,. 427-43
Thiagarajan, R., Ganesan, R., Anbarasu, V., Baskar, M., Arthi, K., & Ramkumar, J. (2021).
Optimised with secure approach in detecting and isolation of malicious nodes in
MANET. Wireless Personal Communications, 119, 21-35.
Umesh K. S., Mewada S., Iaddhani L., &Bunkar K. (2011).An overview and study of security
issues & challenges in mobile ad-hoc networks (MANET), International Journal of
Computer Science and Information Security, 9(4), pp. 106—111.
Wang, K., Song, M., Bian, G., Shao, B., & Huang, K. (2024). A Lightweight Identity-Based
Network Coding Scheme for Internet of Medical Things. Electronics, 13(7), 1316.
Wu, H., Nabar, S., & Poovendran, R. (2012, April). An energy framework for the network
simulator 3 (ns-3). In 4th International ICST Conference on Simulation Tools and
Techniques.
44