Skip to main content
Top
Published in: Wireless Personal Communications 2/2023

09-03-2023

AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET

Authors: Vivek Mankotia, Ramesh Kumar Sunkaria, Shashi Gurung

Published in: Wireless Personal Communications | Issue 2/2023

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Security in a mobile ad-hoc network is an essential requirement that helps in preventing attacks from the malicious node. A flooding attack is a type of denial of service attack that consumes the network bandwidth due to flooding of the fake packets by the flooder node. The different forms of flooding attacks are route request flooding attacks and data flooding attacks. In a route request flooding attack, the flooder node exhausts the network resources with a high number of fake request packets in the network whereas in a data flooding attack; the flooder node sends the fake data packets to the destination. In this paper, we have proposed an Anti-Flooding Attack (AFA) scheme that can detect both types of flooding attacks. NS-2.35 simulator is used to validate the efficiency of the proposed scheme under the effect of different mobility speeds and the number of nodes scenario. The simulation results show that the proposed AFA scheme performs better as compared with an existing scheme on the various performance metrics.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR.
2.
go back to reference Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.CrossRef Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.CrossRef
3.
go back to reference Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.CrossRef
4.
go back to reference Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535. Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535.
5.
go back to reference Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.CrossRef Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.CrossRef
6.
go back to reference Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.CrossRef
7.
go back to reference Ning, P., & Sun, K. (2004). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.CrossRef Ning, P., & Sun, K. (2004). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.CrossRef
8.
go back to reference Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541.
9.
go back to reference Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334. Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334.
10.
go back to reference Yeung, D. S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.CrossRef Yeung, D. S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.CrossRef
11.
go back to reference Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4. Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4.
13.
go back to reference Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.CrossRef Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.CrossRef
14.
go back to reference Chouhan, N. S., & Yadav, S. (2011). Flooding attacks prevention in MANET. International Journal of Computer Technology and Electronics Engineering (IJCTEE), 1(3), 68–72. Chouhan, N. S., & Yadav, S. (2011). Flooding attacks prevention in MANET. International Journal of Computer Technology and Electronics Engineering (IJCTEE), 1(3), 68–72.
15.
go back to reference Roshan, K., Prasad, K. R., Upadhayaya, N., & Govardhan, A. (2012). New-fangled method against data flooding attacks in MANET. International Journal of Computer Science & Information Technology (IJCSIT), 4(3), 25.CrossRef Roshan, K., Prasad, K. R., Upadhayaya, N., & Govardhan, A. (2012). New-fangled method against data flooding attacks in MANET. International Journal of Computer Science & Information Technology (IJCSIT), 4(3), 25.CrossRef
16.
go back to reference S. Hakak, S., Anwar, F., Latif, S. A., Gilkar, G., & Alam, M. K. (2014). Impact of packet size and node mobility pause time on average end to end delay and jitter in MANET’s. In IEEE International Conference on Computer and Communication Engineering. S. Hakak, S., Anwar, F., Latif, S. A., Gilkar, G., & Alam, M. K. (2014). Impact of packet size and node mobility pause time on average end to end delay and jitter in MANET’s. In IEEE International Conference on Computer and Communication Engineering.
17.
go back to reference Kumar, S., Alaria, S., & Kumar, V. (2015). Prevention in sleep deprivation attack in MANET. International Journal of Latest Technology in Engineering (IJLTEMAS), 4(2), 139–144. Kumar, S., Alaria, S., & Kumar, V. (2015). Prevention in sleep deprivation attack in MANET. International Journal of Latest Technology in Engineering (IJLTEMAS), 4(2), 139–144.
18.
go back to reference Bhalodiya, S., & Vaghela, K. (2015). Enhanced detection and recovery from fooding attack in MANETs using AODV routing protocol. International Journal of Computer Applications, 125(4), 10–15.CrossRef Bhalodiya, S., & Vaghela, K. (2015). Enhanced detection and recovery from fooding attack in MANETs using AODV routing protocol. International Journal of Computer Applications, 125(4), 10–15.CrossRef
19.
go back to reference Jatthap, S., & Dashore, P. (2016). Battery capacity based detection and prevention of fooding attack on MANET. In International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), 4(9), 89–99. Jatthap, S., & Dashore, P. (2016). Battery capacity based detection and prevention of fooding attack on MANET. In International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), 4(9), 89–99.
20.
go back to reference Rao, D. S., & Padmanabhuni, V. (2016). An efcient RREQ fooding attack avoidance technique for adaptive wireless network. International Journal of Applied Engineering Research (IJAER), 11(5), 3696–3702. Rao, D. S., & Padmanabhuni, V. (2016). An efcient RREQ fooding attack avoidance technique for adaptive wireless network. International Journal of Applied Engineering Research (IJAER), 11(5), 3696–3702.
21.
go back to reference Pandikumar, T., & Desta, H. (2017). RREQ fooding attack mitigation in MANET using dynamic profle based technique. In International Journal of Engineering Science and Computing (IJESC), 7(6), 12700–12705. Pandikumar, T., & Desta, H. (2017). RREQ fooding attack mitigation in MANET using dynamic profle based technique. In International Journal of Engineering Science and Computing (IJESC), 7(6), 12700–12705.
22.
go back to reference Vimal, V., & Nigam, M. J., (2017). Plummeting food based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique. In Proceedings of the 2017 IEEE Region 10 Conference, pp. 139–144. Vimal, V., & Nigam, M. J., (2017). Plummeting food based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique. In Proceedings of the 2017 IEEE Region 10 Conference, pp. 139–144.
23.
go back to reference Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating route request fooding attack in MANET. Wireless Networks, 23(4), 1–16. Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating route request fooding attack in MANET. Wireless Networks, 23(4), 1–16.
24.
go back to reference Nithya, B., Nair, A., & Sreelakshmi, A. S. (2018). Detection of RREQ flooding attacks in MANETs data and communication networks (pp. 109–121). Singapore: Springer. Nithya, B., Nair, A., & Sreelakshmi, A. S. (2018). Detection of RREQ flooding attacks in MANETs data and communication networks (pp. 109–121). Singapore: Springer.
26.
go back to reference Mohammadi, P., & Ghafari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106, 365–376.CrossRef Mohammadi, P., & Ghafari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106, 365–376.CrossRef
27.
go back to reference Sbai, O., & Elboukhari, M. (2020). Data flooding intrusion detection system for MANETs using deep learning approach. In Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications, pp 1–5. Sbai, O., & Elboukhari, M. (2020). Data flooding intrusion detection system for MANETs using deep learning approach. In Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications, pp 1–5.
28.
go back to reference Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the mobile adhoc network from flooding attack. Turkish Journal of Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765. Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the mobile adhoc network from flooding attack. Turkish Journal of Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765.
29.
go back to reference Nishanth, N., & Mujeeb, A. (2021). Modeling and detection of flooding-based denial of service attacks in wireless ad hoc networks using uncertain reasoning. IEEE Transactions on Cognitive Communications and Networking, 7(3), 893–904.CrossRef Nishanth, N., & Mujeeb, A. (2021). Modeling and detection of flooding-based denial of service attacks in wireless ad hoc networks using uncertain reasoning. IEEE Transactions on Cognitive Communications and Networking, 7(3), 893–904.CrossRef
Metadata
Title
AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET
Authors
Vivek Mankotia
Ramesh Kumar Sunkaria
Shashi Gurung
Publication date
09-03-2023
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2023
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-023-10325-3

Other articles of this Issue 2/2023

Wireless Personal Communications 2/2023 Go to the issue