Skip to main content
Erschienen in: Wireless Networks 8/2018

24.04.2017

A novel approach for mitigating route request flooding attack in MANET

verfasst von: Shashi Gurung, Siddhartha Chauhan

Erschienen in: Wireless Networks | Ausgabe 8/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for establishing the communication path among nodes is that the nodes should be cooperative. However, in the presence of malicious node, the MANET’s routing protocol such as AODV is vulnerable to different types of flooding attacks. The flooding attack can be continuous or selective. In the available literature, although many researchers have analyzed the network under continuous flooding attack but they have not focussed on selective flooding attack in which an attacker can sometimes behave as a normal and sometimes behave as a malicious. Most of the existing schemes use constant threshold value which lead to a false positive problem in the network. In order to address this issue, a new mechanism called as Mitigating Flooding Attack Mechanism is proposed which is based on a dynamic threshold value and consists of three phases. It makes use of several special nodes called as Flooding-Intrusion Detection System (F-IDS) that are deployed in MANETs in order to detect and prevent flooding attack. The F-IDS nodes are set in promiscuous in order to monitor the behaviour of the node. The simulation results show that the proposed mechanism improves network performance metrics in terms of PDR, throughput and reduces the routing overhead as well as normalized routing load.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR.
2.
Zurück zum Zitat Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.CrossRef Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.CrossRef
3.
Zurück zum Zitat Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.CrossRef Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.CrossRef
4.
Zurück zum Zitat Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535. Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535.
5.
Zurück zum Zitat Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.CrossRef Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.CrossRef
6.
Zurück zum Zitat Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.CrossRef Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.CrossRef
7.
Zurück zum Zitat Ning, P., & Sun, K. (2004). How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.CrossRef Ning, P., & Sun, K. (2004). How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.CrossRef
8.
Zurück zum Zitat Perkins, C.E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing (RFC 3561). IETF Internet-Draft MANET working group. Perkins, C.E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing (RFC 3561). IETF Internet-Draft MANET working group.
9.
Zurück zum Zitat Johnson, D. B., Maltz, D. A. & Hu, Y-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft. Johnson, D. B., Maltz, D. A. & Hu, Y-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft.
10.
Zurück zum Zitat Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Springer Wireless Network, 21(8), 2781–2798. doi:10.1007/s11276-015-0945-9.CrossRef Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Springer Wireless Network, 21(8), 2781–2798. doi:10.​1007/​s11276-015-0945-9.CrossRef
11.
12.
Zurück zum Zitat Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2013). Trust-based routing mechanism in MANET: Design and implementation. Springer Mobile Network Application, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.CrossRef Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2013). Trust-based routing mechanism in MANET: Design and implementation.  Springer Mobile Network Application, 18(5), 666–677. doi:10.​1007/​s11036-011-0328-0.CrossRef
13.
Zurück zum Zitat Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the International Conference on Advances in Computing, Communication and Control, pp. 525–529. Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the International Conference on Advances in Computing, Communication and Control, pp. 525–529.
14.
Zurück zum Zitat Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541.
15.
Zurück zum Zitat Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334. Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334.
16.
Zurück zum Zitat Yeung, D.S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting. Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.CrossRef Yeung, D.S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting. Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.CrossRef
17.
Zurück zum Zitat Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4. Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4.
18.
19.
Zurück zum Zitat Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.CrossRef Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.CrossRef
21.
Zurück zum Zitat Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In International Conference of Information Technology: Coding and Computing, pp. 657–662. Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In International Conference of Information Technology: Coding and Computing, pp. 657–662.
22.
Zurück zum Zitat Desilva, S., & Boppana, R, V. (2005). Mitigating malicious control packet floods in ad hoc networks. In IEEE Wireless Communications and Networking Conference, 4, 2112–2117. Desilva, S., & Boppana, R, V. (2005). Mitigating malicious control packet floods in ad hoc networks. In IEEE Wireless Communications and Networking Conference, 4, 2112–2117.
23.
Zurück zum Zitat Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, pp. 497–502. Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, pp. 497–502.
24.
Zurück zum Zitat Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In International Conference of Wireless Communications, Networking and Mobile Computing, pp. 1–4. Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In International Conference of Wireless Communications, Networking and Mobile Computing, pp. 1–4.
25.
Zurück zum Zitat Kataria, J. (2006). A scheme to control flooding of fake route request in ad-hoc networks. In 3rd International Conference on Computer and Devices for Communication, pp. 198–201. Kataria, J. (2006). A scheme to control flooding of fake route request in ad-hoc networks. In 3rd International Conference on Computer and Devices for Communication, pp. 198–201.
26.
Zurück zum Zitat Guo, Y., Gordon, S., & Perreau, S. (2007). A flow based detection mechanism against flooding attacks in mobile ad-hoc networks. In Proceeding of IEEE WCNC, pp. 3107–3112. Guo, Y., Gordon, S., & Perreau, S. (2007). A flow based detection mechanism against flooding attacks in mobile ad-hoc networks. In Proceeding of IEEE WCNC, pp. 3107–3112.
27.
Zurück zum Zitat Nadeem, A., & Howarth, M. (2011). Protection of MANETs from a range of attacks using an Intrusion detection and prevention system. Telecommunication System, 52(4), 2047–2058. doi:10.1007/s11235-011-9484-6.CrossRef Nadeem, A., & Howarth, M. (2011). Protection of MANETs from a range of attacks using an Intrusion detection and prevention system. Telecommunication System, 52(4), 2047–2058. doi:10.​1007/​s11235-011-9484-6.CrossRef
28.
Zurück zum Zitat Laeeq, K. (2012). RFAP, A preventive measure against route request flooding attack in MANETS. In IEEE 15th International Multitopic Conference (INMIC), pp. 480–487. Laeeq, K. (2012). RFAP, A preventive measure against route request flooding attack in MANETS. In IEEE 15th International Multitopic Conference (INMIC), pp. 480–487.
29.
Zurück zum Zitat Singh, P., Raj, A., & Chatterjee, D. (2012). Flood tolerant AODV protocol. International Journal of Computer Applications, 53(6), 18–27.CrossRef Singh, P., Raj, A., & Chatterjee, D. (2012). Flood tolerant AODV protocol. International Journal of Computer Applications, 53(6), 18–27.CrossRef
30.
Zurück zum Zitat Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In 10th IEEE International Conference in Industrial Informatics, pp. 1010–1015. Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In 10th IEEE International Conference in Industrial Informatics, pp. 1010–1015.
31.
Zurück zum Zitat Panos, C., Xenakis, C., Kotzias, P., & Stavrakakis, I. (2014). A specification based intrusion detection engine for infrastructure-less networks. Elsevier Computer Communications, 54, 67–83.CrossRef Panos, C., Xenakis, C., Kotzias, P., & Stavrakakis, I. (2014). A specification based intrusion detection engine for infrastructure-less networks. Elsevier Computer Communications, 54, 67–83.CrossRef
32.
Zurück zum Zitat Chaudhary, A., Tiwari, V., & Kumar, A. (2014). A novel intrusion detection system for adhoc flooding attack using fuzzy logic in mobile adhoc networks. In International Conference on Recent Advances and Innovation in Engineering, pp. 1–4. Chaudhary, A., Tiwari, V., & Kumar, A. (2014). A novel intrusion detection system for adhoc flooding attack using fuzzy logic in mobile adhoc networks. In International Conference on Recent Advances and Innovation in Engineering, pp. 1–4.
33.
Zurück zum Zitat Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In 4th International Conference on Communication Systems and Network Technologies (CSNT), pp. 762–766. Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In 4th International Conference on Communication Systems and Network Technologies (CSNT), pp. 762–766.
34.
Zurück zum Zitat Abdelshafy M, A., & King, P. J. (2014). Resisting flooding attacks on AODV. In 8th International Conference on Emerging Security Information System and Technologies. Abdelshafy M, A., & King, P. J. (2014). Resisting flooding attacks on AODV. In 8th International Conference on Emerging Security Information System and Technologies.
35.
Zurück zum Zitat Jiang, F., Lin, C. H., & Wu, H. W. (2014). Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Elsevier Ad Hoc Networks, 21, 84–96.CrossRef Jiang, F., Lin, C. H., & Wu, H. W. (2014). Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Elsevier Ad Hoc Networks, 21, 84–96.CrossRef
36.
Zurück zum Zitat Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2016). Security upgrade against RREQ flooding attack by using balance index on vehicular adhoc network. Springer Wireless Network. doi:10.1007/s11276-016-1259-2.CrossRef Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2016). Security upgrade against RREQ flooding attack by using balance index on vehicular adhoc network. Springer Wireless Network. doi:10.​1007/​s11276-016-1259-2.CrossRef
37.
Zurück zum Zitat Rao, D. S., & Rao, P. V. (2016). An efficient RREQ flooding attack avoidance technique for adaptive wireless network. International Journal of applied engineering research, 11(5), 3696–3702.MathSciNet Rao, D. S., & Rao, P. V. (2016). An efficient RREQ flooding attack avoidance technique for adaptive wireless network. International Journal of applied engineering research, 11(5), 3696–3702.MathSciNet
Metadaten
Titel
A novel approach for mitigating route request flooding attack in MANET
verfasst von
Shashi Gurung
Siddhartha Chauhan
Publikationsdatum
24.04.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 8/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1515-0

Weitere Artikel der Ausgabe 8/2018

Wireless Networks 8/2018 Zur Ausgabe

Neuer Inhalt