Skip to main content
Top

2016 | OriginalPaper | Chapter

Analysing Performance Disruption of MANET Under Explicit Flooding Attack Frequency

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The number of routing protocol is available in Mobile Ad hoc Networks (MANETs), but none of them is perfect as it is hard to achieve the security in it. The MANETs is in vulnerable of different attacks because the network is scalable and has very dynamic mobile nodes. The performance of protocols is severely affected in the presence of malicious nodes as these causes routing information to be erroneous and introduces excessive traffic load and inefficient routing. In this paper, we analyse the network performance extensively using Ad hoc On Demand Distance Vector (AODV) routing protocol in the presence of a flooding attack with specific frequency rate. The NS2 network simulator is used to analyse this flooding attack on AODV and its impact are shown using various performance metrics like Packet Delivery Ratio (PDR), throughput with variable flooding rates and malicious nodes etc.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Wireless/Mobile Network Security. Springer, Berlin (2008) Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Wireless/Mobile Network Security. Springer, Berlin (2008)
2.
go back to reference Bandyopadhyay, A., Vuppala, S., Choudhury, P.: A simulation analysis of flooding attack in MANET using NS-3. In: IEEE 2nd International Conference on Wireless VITAE (2011) Bandyopadhyay, A., Vuppala, S., Choudhury, P.: A simulation analysis of flooding attack in MANET using NS-3. In: IEEE 2nd International Conference on Wireless VITAE (2011)
3.
go back to reference Ehsan, H., Khan, F.A.: Implementation and analysis of routing attacks in MANETs. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012) Ehsan, H., Khan, F.A.: Implementation and analysis of routing attacks in MANETs. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012)
4.
go back to reference Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. Proc. Wirel. Commun. IEEE 14(5), 85–91 (2007)CrossRef Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. Proc. Wirel. Commun. IEEE 14(5), 85–91 (2007)CrossRef
5.
go back to reference Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioural approach. In: Advance Computing Conference (IACC), IEEE 3rd International (2013) Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioural approach. In: Advance Computing Conference (IACC), IEEE 3rd International (2013)
6.
go back to reference Corson, S., Macker, J.: Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. Internet request for comment RFC 2501 (1999) Corson, S., Macker, J.: Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. Internet request for comment RFC 2501 (1999)
7.
go back to reference Perkins, C., Royer, E.M.: Ad hoc on demand distance vector (AODV) routing. Internet draft (1998) Perkins, C., Royer, E.M.: Ad hoc on demand distance vector (AODV) routing. Internet draft (1998)
8.
go back to reference Eu, Z., Seah, W.: Mitigating route request flooding attacks in mobile ad hoc networks. In: Proceedings of the International Conference on Information Networking (ICOIN’06), Sendai, Japan (2006) Eu, Z., Seah, W.: Mitigating route request flooding attacks in mobile ad hoc networks. In: Proceedings of the International Conference on Information Networking (ICOIN’06), Sendai, Japan (2006)
9.
go back to reference Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05), pp. 657–662 (2005) Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05), pp. 657–662 (2005)
10.
go back to reference Verma, S.S., Patel, R.B., Lenka, S.K.: Investigating variable time flood request impact over QOS in MANET. In: 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015) Verma, S.S., Patel, R.B., Lenka, S.K.: Investigating variable time flood request impact over QOS in MANET. In: 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015)
11.
go back to reference Verma, S.S., Patel, R.B., Lenka, S.K.: Analyzing varying rate flood attack on real flow in MANET and solution proposal: real flow dynamic queue (RFDQ). Int. J. Inf. Commun. Technol. (in press) Inderscience, 7 (2015) Verma, S.S., Patel, R.B., Lenka, S.K.: Analyzing varying rate flood attack on real flow in MANET and solution proposal: real flow dynamic queue (RFDQ). Int. J. Inf. Commun. Technol. (in press) Inderscience, 7 (2015)
12.
go back to reference Shandilya, S.K., Sahu, S.: A trust based security scheme for RREQ flooding attack in MANET. Int. J. Comput. Appl., 5(12), 4–8 (2010) Shandilya, S.K., Sahu, S.: A trust based security scheme for RREQ flooding attack in MANET. Int. J. Comput. Appl., 5(12), 4–8 (2010)
13.
go back to reference Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw. 3(6), 795–819, Elsevier (2005) Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw. 3(6), 795–819, Elsevier (2005)
14.
go back to reference Murphy, S., Yang, Y.: Generic threats to routing protocols. In: IETF RFC4593. Status Informational (2006) Murphy, S., Yang, Y.: Generic threats to routing protocols. In: IETF RFC4593. Status Informational (2006)
15.
go back to reference Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Technical report, Telecommunication and Information Research Institute, Australia (2003) Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Technical report, Telecommunication and Information Research Institute, Australia (2003)
16.
go back to reference Fall, K., Varadhan, K.: NS manual. The VINT Project Fall, K., Varadhan, K.: NS manual. The VINT Project
Metadata
Title
Analysing Performance Disruption of MANET Under Explicit Flooding Attack Frequency
Authors
Priyanka Wadhwani
Sourabh Singh Verma
Copyright Year
2016
DOI
https://doi.org/10.1007/978-3-319-30927-9_6

Premium Partner