Abstract
The number of routing protocol is available in Mobile Ad hoc Networks (MANETs), but none of them is perfect as it is hard to achieve the security in it. The MANETs is in vulnerable of different attacks because the network is scalable and has very dynamic mobile nodes. The performance of protocols is severely affected in the presence of malicious nodes as these causes routing information to be erroneous and introduces excessive traffic load and inefficient routing. In this paper, we analyse the network performance extensively using Ad hoc On Demand Distance Vector (AODV) routing protocol in the presence of a flooding attack with specific frequency rate. The NS2 network simulator is used to analyse this flooding attack on AODV and its impact are shown using various performance metrics like Packet Delivery Ratio (PDR), throughput with variable flooding rates and malicious nodes etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Wireless/Mobile Network Security. Springer, Berlin (2008)
Bandyopadhyay, A., Vuppala, S., Choudhury, P.: A simulation analysis of flooding attack in MANET using NS-3. In: IEEE 2nd International Conference on Wireless VITAE (2011)
Ehsan, H., Khan, F.A.: Implementation and analysis of routing attacks in MANETs. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012)
Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. Proc. Wirel. Commun. IEEE 14(5), 85–91 (2007)
Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioural approach. In: Advance Computing Conference (IACC), IEEE 3rd International (2013)
Corson, S., Macker, J.: Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. Internet request for comment RFC 2501 (1999)
Perkins, C., Royer, E.M.: Ad hoc on demand distance vector (AODV) routing. Internet draft (1998)
Eu, Z., Seah, W.: Mitigating route request flooding attacks in mobile ad hoc networks. In: Proceedings of the International Conference on Information Networking (ICOIN’06), Sendai, Japan (2006)
Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05), pp. 657–662 (2005)
Verma, S.S., Patel, R.B., Lenka, S.K.: Investigating variable time flood request impact over QOS in MANET. In: 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015)
Verma, S.S., Patel, R.B., Lenka, S.K.: Analyzing varying rate flood attack on real flow in MANET and solution proposal: real flow dynamic queue (RFDQ). Int. J. Inf. Commun. Technol. (in press) Inderscience, 7 (2015)
Shandilya, S.K., Sahu, S.: A trust based security scheme for RREQ flooding attack in MANET. Int. J. Comput. Appl., 5(12), 4–8 (2010)
Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw. 3(6), 795–819, Elsevier (2005)
Murphy, S., Yang, Y.: Generic threats to routing protocols. In: IETF RFC4593. Status Informational (2006)
Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Technical report, Telecommunication and Information Research Institute, Australia (2003)
Fall, K., Varadhan, K.: NS manual. The VINT Project
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Wadhwani, P., Verma, S.S. (2016). Analysing Performance Disruption of MANET Under Explicit Flooding Attack Frequency. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-30927-9_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30926-2
Online ISBN: 978-3-319-30927-9
eBook Packages: EngineeringEngineering (R0)