See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/353744368 Machine Learning Based Security Solutions in MANETs: State of the art approaches Article in Journal of Physics Conference Series · August 2021 DOI: 10.1088/1742-6596/1950/1/012070 CITATIONS READS 6 158 5 authors, including: Monika Sethi Isha Kansal Chitkara University Chitkara University 14 PUBLICATIONS 80 CITATIONS 5 PUBLICATIONS 9 CITATIONS SEE PROFILE SEE PROFILE Nitin Goyal Central University of Haryana 112 PUBLICATIONS 1,068 CITATIONS SEE PROFILE Some of the authors of this publication are also working on these related projects: A Survey on Deployment Strategies and Energy Efficiency of Wireless Sensor Networks View project All content following this page was uploaded by Nitin Goyal on 26 April 2022. The user has requested enhancement of the downloaded file. Journal of Physics: Conference Series You may also like PAPER • OPEN ACCESS Machine Learning Based Security Solutions in MANETs: State of the art approaches - A Survey of The Design and Security Mechanisms of The Wireless Networks and Mobile Ad-Hoc Networks Keshav Kumar, Sahil Verma, Kavita et al. To cite this article: Renu Popli et al 2021 J. Phys.: Conf. Ser. 1950 012070 - Forecast Function Based Congestion Control in MANET Routing G Suresh, Senthil Kumar, V Kavitha et al. View the article online for updates and enhancements. - Efficient Intrusion detection of malicious node using Bayesian Hybrid Detection in MANET V Sangeetha, M Vaneeta, S Swapna Kumar et al. This content was downloaded from IP address 167.160.54.35 on 26/04/2022 at 01:59 ICMAI 2021 Journal of Physics: Conference Series 1950 (2021) 012070 IOP Publishing doi:10.1088/1742-6596/1950/1/012070 Machine Learning Based Security Solutions in MANETs: State of the art approaches Renu Popli1, Monika Sethi2, Isha Kansal3, Atul Garg4 and Nitin Goyal5 Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab, India E-mail: renu_popli@yahoo.co.in Abstract. Machine learning (ML) techniques provide the learning capability to a system and encourage adaptation into the environment, based upon many logical and statistical operations. The prime goal of ML is to recognize the complex patterns and make decisions based on the results. There are various ML algorithms which are implemented to secure the mobile ad-hoc networks. The infrastructure-less environment of MANETs poses a great challenge in implementation of the security systems. The security approaches in MANETs mainly focus on intrusion detection, malicious attacks mitigation, elimination of outlier/misbehavior/selfish nodes and securing routing paths. The researchers have been using cutting edge technologies for providing efficient security solutions by taking into the consideration of dynamic environment of MANETs. These technologies include machine learning, Artificial Intelligence (AI), Genetic Algorithms based methods, biological-inspired algorithms and so on. This paper presents a comprehensive and systematic study of various modern approaches for intensifying security in MANETs. 1. Introduction MANET consists of mobile nodes which are connected by wireless medium in an infrastructure-less dynamic network [1]. The unique properties of MANETs increase its applications in areas where the installation of infrastructure is not feasible such as in military, rescue operations, health care, virtual conferences etc. Furthermore, in critical scenarios such as battlefield communication, security in this network is an inevitable issue. The vulnerabilities in the network make it an attractive choice for introducing attacks to breach the security. Hence, it is imperative to choose an efficient and flexible security system which should be robust enough to filter out any malicious activity from the network. Due to dynamic nature of Mobile nodes in MANETs, the topology of the network is not fixed which poses enormous challenges in implementing any security mechanism. There is no any central authority available for communication, the network is self-configured and selfdeployed [2]. Since, the communication among the nodes takes place through wireless medium; the network is more prone to errors and security threats. In addition, each node is connected to other node in its vicinity and multi-hop communication occurs where data packets gets forwarded by many nodes in between the path. Thus, the constraints of the dynamic infrastructure in MANETs open up many areas of research in the security of MANETs [3]. The ML based algorithms can be applied in the adhoc environment to create a predictive model for finding out the unforeseen security threats. So, the further sections of this paper clearly specify the role of ML based algorithms in maintaining security in MANETs. Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI. Published under licence by IOP Publishing Ltd 1 ICMAI 2021 Journal of Physics: Conference Series 1950 (2021) 012070 IOP Publishing doi:10.1088/1742-6596/1950/1/012070 2. Security Approaches in MANETs The unique features of MANETs such as decentralization, self-management etc. attracts various attacks in the network. In last decade, a variety of security mechanisms are proposed to detect attacks and mitigate the effects of them. The broad classification of these approaches is shown below: The earliest security protocols in MANETs were relied upon the cryptographic approach. In 1999, a key management system for providing authentication in ad hoc networks with the help of threshold cryptography was implemented. In the proposed system, some nodes perform the task of servers and a few nodes took the role of administrator. Further, a secure version of AODV was proposed named as SAODV [4]. The proposed method implemented digital signatures and hash chains for cryptographic security in ad hoc networks. A huge number of cryptographic mechanisms were based upon the central authority for the disbursement of certificates for authentication purpose [5][6][7][8]. However, some other methods modified the concept of central supervision analogous to PGP web of trust model [9][10]. In these methods, the node itself equipped to store their certificates, thus authentication process includes a chain of certificates stored at their ends. In literature, it has been observed that the cryptographic mechanisms introduced a significant delay in the communication and a prior connection needs to be maintained between the nodes which are not feasible in ad-hoc networks. So the researchers brought together a large collection of hybrid methods for security enhancement in MANETs. The nodes in MANETs are exposed to various kinds of attacks including active as well as passive attacks. For example, some of the common attacks are denial of service attack, man in the middle attack, flooding, spoofing, impersonation, black hole and grey hole attacks etc. In literature, various intrusion detection systems are worked to detect different type of attacks. In nutshell, a number of cryptographic mechanisms were employed in past to introduce security features in MANETs, but in last decade, there is a shift in network paradigm as new technologies such as machine learning, deep learning, AI, genetic algorithms have become a significant choice for researchers in finding effective and optimized solutions for security in MANETs. Therefore, this paper introduces state of the art technologies which have been proved to be very effective in providing the security solutions. It involved detection, prevention, prediction and mitigation of compromised nodes and various secure routing protocols based on machine learning. 3. Security Solutions Based on Machine Learning Security is an essential requirement for any network operations such as packets and routing protocols. While designing of sensitive applications, the critical security features of the network need to be considered. Machine Learning techniques help in designing a predictive model where model is trained with the training data for specific attack patterns and then tested by remaining test data. The accuracy of the learning model is assessed based upon the accuracy of identifying new attack patterns. Due to open environment of the network, nodes in MANETs are more prone to different types of attacks such as black hole, worm hole, grey hole, flooding, DoS attacks etc. Furthermore, the nodes in MANETs exhibit multi hop communication which means source node passes packets to a number of intermediate nodes before destination node. Each communication depends upon the co-operation among the nodes. So, as a security measure, it is essential to figure out trustworthiness of the nodes so that packets should not be forwarded to any untrustworthy or malicious node in the network. For this purpose, there are a number of trust evaluation methods proposed in literature to enhance security in the network. Thus, security mechanisms in MANETs can be segregated into the following categories as shown in Figure 1. Furthermore, ML plays a vital role in enhancing the security of mobile ad-hoc networks. Various ML algorithms can be suitably applied in MANETs to identify intrusions as well as specific attack patterns. Nevertheless, various trusted systems are also proposed in literature to improve security features in the network. Hence, ML based approaches for three specific areas of security in MANETs are elaborated as follows: 2 ICMAI 2021 Journal of Physics: Conference Series 1950 (2021) 012070 IOP Publishing doi:10.1088/1742-6596/1950/1/012070 Figure 1. Classification of Security Approaches in MANETs 3.1 Machine Learning Based Intrusion Detection System IDS (Intrusion Detection System) correspond to a defense mechanism which is deployed in MANETs to monitors and investigate suspicious events. It includes various mechanisms for identifying different kind of abnormalities in the network. In MANETs, due to open nature, the nodes can join and leave at any time which makes the network more vulnerable to different kind of attacks. The major objective of IDS is to identify any malicious activity before it can harm the network. So every node in MANETs is equipped with IDS to filter the unauthorized access. As nodes in MANETs are constrained of resources, it poses a great challenge in implementation of IDS in real life scenarios. Machine learning techniques help in identifying various novel threats and vulnerabilities. IDS can be configured based upon various machine learning techniques such as Fuzzy logic, Genetic Algorithms, Bayesian theory, neural networks. IDS can be broadly classified into three categories, which are: anomaly detection systems, misuse detection systems and signature-based detection systems [11]. Anomaly detection systems can filter unauthorized or outlier nodes by comparing the actions of nodes with the regular normal patterns. If a node is found to behave outlier, it is labeled as intrusion. On the contrary, misuse detection systems and signature-based systems rely upon the stored signature or behavior patterns, so they are unable to detect novel attacks. Thus, anomaly detection systems outperform in terms of identifying unknown vulnerabilities as it works on the vision that any intruder never follow the regular attack pattern but the drawback is a large number of false alarms. ML based IDSs have become a fascinating choice for researchers fraternity in order to deploy some methods which helps in reducing the true negatives and false negatives in the systems and enhancing security in MANETs. Various classification approaches in ML can be applied to classify normal and intruder nodes. Two novel IDSs based upon hierarchical architecture and distributed architecture introduced in 2003 [12]. The proposed frameworks deployed SVM classification technique and mainly designed for securing the network layer. Later on another classification based IDS was proposed and the authors developed a hybrid model based upon Bayesian classifier, Markov chain rules and Association rule mining for introducing security in MANETs [13]. The proposed method provided the security at different layers such as MAC, routing and application layers. The characteristics of the nodes at different layers then evaluated to identify the impostor nodes. Further, in regard to building ensemble classifiers for IDS, a multi-level hierarchical model was introduced for collecting and processing data by using ensembles classification methodology [14]. In this, to process the anomaly indexes, clustering techniques were tested. The testing of the ensemble model was performed using two different routing protocols and using multi attack model. The authors 3 ICMAI 2021 Journal of Physics: Conference Series 1950 (2021) 012070 IOP Publishing doi:10.1088/1742-6596/1950/1/012070 derived remarkable deductions regarding benefits of averaging with detection accuracy, which can improve when moving up in the node-cluster hierarchy. The security was further enhanced by employing ANN based IDS in MANETs [15]. The model was proposed specifically for DoS type of attacks. The authors claimed that simulated model provided very high detection accuracy model, however it could perform better if less number of features selected during implementation. A KNN based unique IDS was proposed in 2014 [16]. The model works with the Conformal Prediction K-Nearest Neighbor (CP KNN) algorithmic rule to classify the nodes based upon knowledge for anomaly detection. To reduce the classification time, non-conformity score value was exploited for multilevel repetition. The model witnessed high detection accuracy with large true positive rate and small false positive rate. The authors claimed the high confidence rate even in the presence of noisy data. Further, a novel routing protocol independent IDS model based upon SVM classification approach was introduced [17]. The proposed system specifically used to identify DoS type of attacks. The nodes were classified into regular and abnormal nodes with high detection rate of 94%. The authors observed that instead of mobility of nodes in the network, the system performance did not reduce and has contributed to increase the reliability of the network considerably. Another remarkable approach of IDS based upon ANN was specified in 2019 [18]. The model implemented classification based upon ANN to identify, classify and blacklist the malicious nodes from the network. The proposed model achieved high accuracy with a detection rate of 88.23%. 3.2 Detection of Compromised or Outlier Nodes in MANETs using Machine Learning The prime issue inherent in the functioning of MANETs is the complexity in identification and mitigation of various kinds of attacks [19]. The nodes in MANETs are quite unsecured due to open wireless nature of the network. This has stimulated several researcher’s interests into keeping their security by using latest technologies, out of which, some has been described in the previous section. A model for detection of flooding attack using SVM classification algorithm was proposed [20]. The authors trained SVM with various attack patters comprising flooding attack and model is tested in the simulated environment. The results show that the model can successfully identify flooding attack but cannot provide satisfactory output in case of multi-attack model. An improved attack classification model with KNN (K Nearest Neighbors) for wireless networks to classify normal and misbehaving nodes based upon their behavior patterns e.g. message forwarding rate, varying number of destination in sending messages etc was highlighted [21]. The implementation provides accurate results, however, no mechanism is provided for generating datasets. Further, a different model for classification of misbehavior nodes and normal nodes in MANETs was defined [22]. The authors applied SVM model with Ad-hoc on-demand routing protocol and the classification is performed based upon packet dropping behavior of the nodes. The performance of the approach was evaluated by calculating packet delivery ratio, packet modification and misroute ratio. A hybrid approach consisting of SOFM (Self Organized Features Maps) and Genetic Algorithm for detection of attacks was proposed in 2018 [23]. In this, the unsupervised learning ability of the SOFM was utilized to define Neutrosophic conditional variables in MANETs. These variables and training data are given as input to the GA to analyze the fittest rules to detect different novel attack patterns. The authors claimed an accuracy of 99.3% in identification of attacks. In addition to this, a novel approach based upon SVM classification for detection of Denial of Service Attack was illustrated [24]. The authors analyzed the model for detection of accuracy as well as computational time. Recently, a similar approach which focused on computational time to identify malicious node is adopted by the researchers [18]. They developed a model using ANN classification approach for classifying nodes into normal and blacklisted nodes. The authors designed a predictive model for identification of multiple attacks in MANETs but the accuracy obtained is 88.23% only. İn 2019, a classification of misbehavior detection into anomaly detection, intrusion detection and misuse detection was described. The authors claim that among all three methods, anomaly detection methods have the capacity to identify anonymous attacks for which system is not trained. However, an 4 ICMAI 2021 Journal of Physics: Conference Series 1950 (2021) 012070 IOP Publishing doi:10.1088/1742-6596/1950/1/012070 IDS (Intrusion Detection System) can identify an event which is deviated from the regular pattern [11]. A comparison of two classification models by taking simulated network packet data as input in order to find out the efficient model for predicting various kinds of attacks in MANETs was performed [17]. The performance of both classification models which were SVM and LR analyzed based upon accuracy and detection capacity having less number of false alarms for network communication. The results showed that LR beat SVM in terms of accuracy with 100% detection accuracy and correctly identified malicious attacks in the network. LR also retained uniformity in terms of specificity, sensitivity, precision and misclassification rates. İn 2020, a location-based misbehavior detection approach for providing security in MANETs was proposed [25]. In this, the authors focused on the optimized path calculation by using Learning Automata and privacy is introduced by using efficient cryptography algorithm. 3.3 Machine Learning Based Trusted System for Enhancement of Security in MANETs The nodes in MANETs work in unreliable environment and they co-operate each other in forwarding the data packets. So, in order to secure the network, a trustworthiness value is assigned or earned by each node. Many researchers are working on these aspects of security to provide reliability in the network. İn 2004, a trust system by using K nearest neighborhood approach was presented in which the value of trust was judged based on the opinions of K trusted entities in a specified time [8]. The value of K depends upon the current state of the network as well as number of valid neighbors. However, this may sometimes lead to conflicts in the network. Due to dynamic, complex and fuzzy characteristics of trust metrics, various trust methods were defined based on fuzzy logic [26]. A global approach for evaluating trust based upon summarized trust values was provided [27]. In the defined approach, trust model relied on a defined function to calculate the degree of trust and similarly, a trust approach based on Bayesian theory was introduced by the researchers [28]. Another approach implemented reinforcement machine learning algorithm in the dynamic environment of MANETs [29]. The authors claim that the algorithm did not depend upon historical data and can predict the new node behavior in the network. And when selecting the best algorithm because of the physical distribution of MANET information, an algorithm which has the ability to be distributed among the nodes has to be chosen. Instead of considering direct and indirect trust separately, it is recommended to apply a hybrid trust approach which aggregates the trust values. Further, an enhanced trust model based upon reinforcement learning and deep learning method in MANETs was proposed [30]. The authors implemented the model using AODV protocol and classified nodes into trustworthy and untrustworthy nodes by feeding the simulated data into RNN (Recurrent Neural Network). A trust evaluation model based on fuzzy theory was proposed in 2019 [31]. In the proposed work, three parameters were used such as Packet Drop Rate (PDR), Battery Discharge Rate (BDR) and Number of Link Requests (NLR). The proposed system provided more accuracy and less computation overhead as compared to the existing trust model on increasing the percentage of malicious nodes. 4. Conclusion The dynamic infrastructure of MANETs poses a great challenge in introducing security in the network. To reduce the security threats, a number of security approaches are proposed in literature. As the machine learning techniques has potential of finding out unseen or unknown threats, so it has become an ardent choice among researcher’s fraternity. This paper has comprehensively categorized various ML algorithms-based security approaches in MANETs. The security approaches are divided into three dimensions such as Machine Learning Based IDS, Attack detection models and trust based models. References [1] Goyal N and Gaba A 2013 A new approach of location aided routing protocol using minimum bandwidth in mobile ad- 5 ICMAI 2021 Journal of Physics: Conference Series [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] 1950 (2021) 012070 hoc network International Journal of Computer Technology and Applications 4 pp 653. Popli R, Garg K and Batra S 2016 SECHAM: Secure and efficient cluster head selection algorithm for MANET 3rd International Conference on Computing for Sustainable Global Development (INDIACom) pp 1776-1779 IEEE. Kamboj P and Goyal N 2015 Survey of various keys management techniques in MANET International Journal of Emerging Research in Management & Technology 4. Zapata M G and Asokan N 2002 Securing ad hoc routing protocols WiSE ’02: Proceedings of the ACM workshop on Wireless security ACM Press. Zhou L, Hass Z J 1999 Securing ad hoc networks IEEE Network 13 pp 24-30. Buiati F, Puttini R, de Sousa R, Abbas C J B, Villalba L J G 2004 Authentication and Autoconfiguration for MANET Nodes 2004 Embedded and Ubiquitous Computing EUC 2004 Lecture Notes in Computer Science 3207 Springer. Asokan N, Ginzboorg P 2000 Key agreement in ad hoc networks Computer Communications 23 1627–1637. Seung Yi and Kravets R 2002 MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks OAI 2004. Hubaux J P, Buttyan L, and Capkun S 2001 The quest for security in mobile ad hoc networks Mobile Ad Hoc Networks Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing MobiHOC 2001. Capkun S, Buttya L and Hubaux J P 2003 Self-Organized Public-Key Management for Mobile Ad Hoc Networks IEEE Transactions on Mobile Computing 2. Hamza F and Vigila S M C 2019 Review of Machine Learning-Based Intrusion Detection Techniques for MANETs Proc. Computing and Network Sustainability pp 367-374 Springer. Deng H, Zeng Q and Agrawal D P 2003 SVM-based intrusion detection system for wireless ad hoc networks Proc 58th IEEE Vehicular Technology Conference (VTC03) 3 pp 2147–2151. Bose S, Bharathimurugan S and Kannan A 2007 Multi-layer intergraded anomaly intrusion detection for mobile ad hoc networks Proc IEEE International Conference on Signal Processing Communications and Networking (ICSCN 2007) p 360–365. Cabrera J.B.D., Gutirrez C., and Mehra R.K. 2008 Ensemble methods for anomaly detection and distributed intrusion detection in mobile ad hoc networks Information Fusion 9 pp 96–119. Moradi Z, Teshnehlab M and Rahmani A 2011 Implementation of neural networks for intrusion detection in MANET International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT). Lalli M and Palanisamy V 2014 A novel intrusion detection model for mobile ad-hoc networks using CP-KNN International Journal of Computer Networks & Communications (IJCNC) 6. Sebopelo R, Isong B and Gasela N 2019 Identification of Compromised Nodes in MANETs using Machine Learning Technique International Journal of Computer Network and Information Security 11. Sowah R A, Ofori-Amanfo K B, Mills G A and Koumadi K M 2019 Detection and prevention of man-in-the-middle spoofing attacks in MANETs using predictive techniques in Artificial Neural Networks (ANN) Journal of Computer Networks and Communications. Goyal N, Sandhu J K, Verma L 2021 CDMA-Based Security Against Wormhole Attack in Underwater Wireless Sensor Networks Advances in Communication and Computational Technology Lecture Notes in Electrical Engineering 668 Springer pp 829-835. Patel M, Sharma S and Sharan D 2013 Detection and prevention of flooding attack using SVM Proc of the 3rd International Conference on Communication Systems and Network Technologies CSNT pp. 533–537. Wenchao Li, Ping Yi, Yue Wu, Li Pan and Jianhua Li 2014 A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network Journal of Electrical and Computer Engineering 2014 Article ID 240217. Patel N J and Jhaveri R H 2015 Detecting packet dropping misbehaving nodes using support vector machine (SVM) in MANET International Journal of Computer Applications 122. Elwahsh H, Gamal M, Salama A A and Henawy I M 2018 A novel approach for classifying MANETs attacks with a neutrosophic intelligent system based on genetic algorithm Security and Communication Networks 2018 Article ID 5828517 pp 1-10. Shams E A and Rizaner A 2018 A novel support vector machine based intrusion detection system for mobile ad hoc networks Wireless Networks 24 pp 1821-1829. Suma R, Premasudha B G and Ravi R V 2020 International Journal of Networking and Virtual Organisations 22 pp.17 – 41. Nefti S, Meziane F and Kasiran K 2005 A fuzzy trust model for e-commerce IEEE International Conference on ECommerce Technology pp 401–404. Damiani E, Vimercati S.D.C.D., Samarati P 2006 A wowa-based aggregation technique on trust values connected to metadata. Electron Notes Theor. Comput. Sci. 157 pp 131–142. Josang A and Quattrociocchi W 2009 Advanced features in Bayesian reputation systems TrustBus LNCS 5695 pp 105– 114 Springer. Jinarajadasa G, Rupasinghe L and Murray I 2018 A reinforcement learning approach to enhance the trust level of MANETs National information technology conference (NITC) pp 1-7 IEEE. Jinarajadasa G M and Liyanage S R 2019 A trust based advanced machine learning approach for mobile ad-hoc network security 4th International Conference on Advances in Computing and Technology (ICACT‒2019). Popli R, Juneja V, Garg K and Gupta D V 2019 Fuzzy Based Trust Evaluation Model for Enhancing Security in MANETs International Journal of Engineering and Advanced Technology (IJEAT) 8 pp 506-510. 6 View publication stats IOP Publishing doi:10.1088/1742-6596/1950/1/012070