Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks.

Sci Rep

Department of Software and Systems Engineering, School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, Tamil Nadu, India.

Published: April 2025


Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

Wireless ad-hoc networks operate independently of existing infrastructure, using devices like access points to connect end-user computing devices. Current methods face issues such as low detection accuracy, structural deviation, and extended processing times. This paper proposes a cross-layer approach that leverages knowledge from the physical and Medium Access Control (MAC) layers, which is then shared with higher layers to effectively mitigate wormhole and blackhole attacks. A wormhole attack disrupts communication through tunneling, while a blackhole attack manipulates network traffic by impersonating the source. The proposed cross-layer framework integrates the network, MAC, and physical layers, and is independent of specific network protocols. The physical layer handles channel interference, the network layer manages process handling, and the MAC layer oversees bandwidth information and tracks failed transmissions. Performance metrics are measured in seconds. The Enhanced Support Vector Machine (E-SVM) algorithm, implemented using NS3 software, demonstrates superior performance compared to traditional SVM techniques across multiple metrics, including average energy consumption, average remaining energy, packets received, packet delivery ratio, delay, jitter, throughput, normalized overhead, dropping ratio, and goodput. Simulation results show that E-SVM achieves a 12.5% dropping ratio, 98.459% energy consumption, and an 89.2879% packet delivery ratio, outperforming existing SVM techniques across various network sizes.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC12034816PMC
http://dx.doi.org/10.1038/s41598-025-97094-0DOI Listing

Publication Analysis

Top Keywords

wireless ad-hoc
8
ad-hoc networks
8
svm techniques
8
energy consumption
8
packet delivery
8
delivery ratio
8
dropping ratio
8
network
5
innovative cross-layer
4
cross-layer defense
4

Similar Publications

Vehicular Ad-Hoc Networks (VANETs) have facilitated the massive exchange of real-time traffic and weather conditions, which have helped prevent collisions, reduce accidents, and road congestions. This can effectively enhance driving safety and efficiency in technology-driven transportation systems. However, the transmission of massive and sensitive information across public wireless communication channels exposes the transmitted data to a myriad of privacy as well as security threats.

View Article and Find Full Text PDF

Innovative cross-layer defense mechanisms for blackhole and wormhole attacks in wireless ad-hoc networks.

Sci Rep

April 2025

Department of Software and Systems Engineering, School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, Tamil Nadu, India.

Wireless ad-hoc networks operate independently of existing infrastructure, using devices like access points to connect end-user computing devices. Current methods face issues such as low detection accuracy, structural deviation, and extended processing times. This paper proposes a cross-layer approach that leverages knowledge from the physical and Medium Access Control (MAC) layers, which is then shared with higher layers to effectively mitigate wormhole and blackhole attacks.

View Article and Find Full Text PDF

Traditional routing protocols in MANETs, such as AODV, do not take energy consumption into account, which leads to inefficient utilization of the limited battery resources. In such networks, nodes depend on non-rechargeable batteries, and once the energy is depleted, the nodes can no longer function, resulting in frequent link failures and reduced network lifetime. To address these challenges, this paper proposed a novel routing protocol, the Energy Aware Stable Path Ad Hoc On-Demand Distance Vector (EASP-AODV), which incorporates residual energy of individual nodes and received signal strength to improve routing decisions.

View Article and Find Full Text PDF

Recent advances in wireless communication have enabled the development of small, low-cost, wearable sensors, which play a crucial role in applications such as healthcare monitoring, environmental sensing, and industrial automation. However, maximizing network lifetime (NL) and optimizing energy consumption remain key challenges in Wireless Sensor Networks (WSNs). Existing routing algorithms often struggle to balance energy efficiency and service quality, leading to premature network failures.

View Article and Find Full Text PDF

The exponential growth of wireless traffic has imposed new technical challenges on the Internet and defined new approaches to dealing with its intensive use. Caching, especially cooperative caching, has become a revolutionary paradigm shift to advance environments based on wireless technologies to enable efficient data distribution and support the mobility, scalability, and manageability of wireless networks. Mobile ad hoc networks (MANETs), wireless mesh networks (WMNs), Wireless Sensor Networks (WSNs), and Vehicular ad hoc Networks (VANETs) have adopted caching practices to overcome these hurdles progressively.

View Article and Find Full Text PDF