Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis

  • Payam Mohammadi
  • Ali GhaffariEmail author


Due to their specific structure and plenty of their utilization, mobile ad-hoc networks are vulnerable to various attacks. An attack which impacts on network layer is referred to as flooding attack. By transmitting several packets, this attack occupies the processor so that it cannot receive the remaining data and packets. Hence, it causes disruption and disorder in the network. In this paper, for preventing this problem, a method has been proposed based on DSR routing protocol which quickly identifies the flooding attack. Indeed, the proposed method not only identifies and detects the malicious nodes in comparison with valid and proper nodes but also imposes sufficient penalties and reconsiders it again. The method proposed in this paper is called defending against flooding attacks-dynamic source routing. At the outset, it detects misbehavior in the network; then, for discovering malicious nodes, it uses average packet transmission RREQ which measures average transmission route request (RREQ) packets. The results of simulating the proposed method in NS-2 environment indicated that it improved packet delivery rate and end-to-end delay.


Mobile ad-hoc networks (MANETs) Flooding attack Safe routing Average packet transmission RREQ (APTR) Dynamic source routing (DSR) 



  1. 1.
    Ghaffari, A. (2017). Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms. Wireless Networks, 23, 703–714.CrossRefGoogle Scholar
  2. 2.
    Asadi, E., & Ghaffari, A. (2016). A multicast routing protocol based on ODMRP with stable link in mobile ad hoc networks. International Journal of Computer Science and Information Security, 14, 68.Google Scholar
  3. 3.
    Ghaffari, A. (2015). Congestion control mechanisms in wireless sensor networks: A survey. Journal of Network and Computer Applications, 52, 101–115.CrossRefGoogle Scholar
  4. 4.
    Azari, L., & Ghaffari, A. (2015). Proposing a novel method based on network-coding for optimizing error recovery in wireless sensor networks. Indian Journal of Science and Technology, 8, 859–867.CrossRefGoogle Scholar
  5. 5.
    Mohammadi, R., & Ghaffari, A. (2015). Optimizing reliability through network coding in wireless multimedia sensor networks. Indian Journal of Science and Technology, 8, 834–841.CrossRefGoogle Scholar
  6. 6.
    Ghaffari, A. (2014). Designing a wireless sensor network for ocean status notification system. Indian Journal of Science and Technology, 7, 809–814.Google Scholar
  7. 7.
    Chang, J.-M., Tsou, P.-C., Woungang, I., Chao, H.-C., & Lai, C.-F. (2015). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Systems Journal, 9, 65–75.CrossRefGoogle Scholar
  8. 8.
    Guo, Y., Gordon, S., & Perreau, S. (2007). A flow based detection mechanism against flooding attacks in mobile ad hoc networks. In Wireless communications and networking conference, 2007. WCNC 2007 (pp. 3105–3110). Washington: IEEE.Google Scholar
  9. 9.
    Verma, S. S., Patel, R., & Lenka, S. K. (2017). Analysing varying rate flood attack on real flow in MANET and solution proposal ‘real flow dynamic queue’. International Journal of Information and Communication Technology, 10, 276–286.CrossRefGoogle Scholar
  10. 10.
    Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2016). Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wireless Networks, 23(6), 1863–1874.CrossRefGoogle Scholar
  11. 11.
    Sakiz, F., & Sen, S. (2017). A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Networks, 61, 33–50.CrossRefGoogle Scholar
  12. 12.
    Kumar, S., & Dutta, K. (2017). Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks. International Journal of Electronics, 104, 1034–1049.CrossRefGoogle Scholar
  13. 13.
    Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A survey of network anomaly detection techniques. Journal of Network and Computer Applications, 60, 19–31.CrossRefGoogle Scholar
  14. 14.
    Yu, J., Kang, H., Park, D., Bang, H.-C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59, 1005–1012.CrossRefGoogle Scholar
  15. 15.
    Hu, Y.-C., Johnson, D., & Maltz, D. (2004). The dynamic source routing protocol for mobile ad hoc networks (DSR). IETF Draft.Google Scholar
  16. 16.
    Kaur, T., Toor, A. S., & Saluja, K. K. (2014). Defending MANETs against flooding attacks for military applications under group mobility. In 2014 recent advances in engineering and computational sciences (RAECS), 2014 (pp. 1–6).Google Scholar
  17. 17.
    Gurung, S., & Chauhan, S. (2018). A novel approach for mitigating route request flooding attack in MANET. Wireless Networks, 24(8), 2899–2914.CrossRefGoogle Scholar
  18. 18.
    Chaudhary, A., Tiwari, V., & Kumar, A. (2014). A novel intrusion detection system for ad hoc flooding attack using fuzzy logic in mobile ad hoc networks. In Recent advances and innovations in engineering (ICRAIE), 2014 (pp. 1–4).Google Scholar
  19. 19.
    Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In 2012 10th IEEE international conference on industrial informatics (INDIN) (pp. 1010–1015).Google Scholar
  20. 20.
    Jiang, F.-C., Lin, C.-H., & Wu, H.-W. (2014). Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Networks, 21, 84–96.CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer Engineering, Germi BranchIslamic Azad UniversityGermiIran
  2. 2.Department of Computer Engineering, Tabriz BranchIslamic Azad UniversityTabrizIran

Personalised recommendations