Skip to main content

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 51))

  • 930 Accesses

Abstract

The number of routing protocol is available in Mobile Ad hoc Networks (MANETs), but none of them is perfect as it is hard to achieve the security in it. The MANETs is in vulnerable of different attacks because the network is scalable and has very dynamic mobile nodes. The performance of protocols is severely affected in the presence of malicious nodes as these causes routing information to be erroneous and introduces excessive traffic load and inefficient routing. In this paper, we analyse the network performance extensively using Ad hoc On Demand Distance Vector (AODV) routing protocol in the presence of a flooding attack with specific frequency rate. The NS2 network simulator is used to analyse this flooding attack on AODV and its impact are shown using various performance metrics like Packet Delivery Ratio (PDR), throughput with variable flooding rates and malicious nodes etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey on attacks and countermeasures in mobile ad hoc networks. In: Wireless/Mobile Network Security. Springer, Berlin (2008)

    Google Scholar 

  2. Bandyopadhyay, A., Vuppala, S., Choudhury, P.: A simulation analysis of flooding attack in MANET using NS-3. In: IEEE 2nd International Conference on Wireless VITAE (2011)

    Google Scholar 

  3. Ehsan, H., Khan, F.A.: Implementation and analysis of routing attacks in MANETs. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (2012)

    Google Scholar 

  4. Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. Proc. Wirel. Commun. IEEE 14(5), 85–91 (2007)

    Article  Google Scholar 

  5. Patel, M., Sharma, S.: Detection of malicious attack in MANET a behavioural approach. In: Advance Computing Conference (IACC), IEEE 3rd International (2013)

    Google Scholar 

  6. Corson, S., Macker, J.: Mobile ad hoc networking (MANET): routing protocol performance issues and evaluation considerations. Internet request for comment RFC 2501 (1999)

    Google Scholar 

  7. Perkins, C., Royer, E.M.: Ad hoc on demand distance vector (AODV) routing. Internet draft (1998)

    Google Scholar 

  8. Eu, Z., Seah, W.: Mitigating route request flooding attacks in mobile ad hoc networks. In: Proceedings of the International Conference on Information Networking (ICOIN’06), Sendai, Japan (2006)

    Google Scholar 

  9. Yi, P., Dai, Z., Zhong, Y., Zhang, S.: Resisting flooding attacks in ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05), pp. 657–662 (2005)

    Google Scholar 

  10. Verma, S.S., Patel, R.B., Lenka, S.K.: Investigating variable time flood request impact over QOS in MANET. In: 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015)

    Google Scholar 

  11. Verma, S.S., Patel, R.B., Lenka, S.K.: Analyzing varying rate flood attack on real flow in MANET and solution proposal: real flow dynamic queue (RFDQ). Int. J. Inf. Commun. Technol. (in press) Inderscience, 7 (2015)

    Google Scholar 

  12. Shandilya, S.K., Sahu, S.: A trust based security scheme for RREQ flooding attack in MANET. Int. J. Comput. Appl., 5(12), 4–8 (2010)

    Google Scholar 

  13. Ning, P., Sun, K.: How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw. 3(6), 795–819, Elsevier (2005)

    Google Scholar 

  14. Murphy, S., Yang, Y.: Generic threats to routing protocols. In: IETF RFC4593. Status Informational (2006)

    Google Scholar 

  15. Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A review of routing protocols for mobile ad hoc networks. Technical report, Telecommunication and Information Research Institute, Australia (2003)

    Google Scholar 

  16. Fall, K., Varadhan, K.: NS manual. The VINT Project

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Wadhwani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Wadhwani, P., Verma, S.S. (2016). Analysing Performance Disruption of MANET Under Explicit Flooding Attack Frequency. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30927-9_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30926-2

  • Online ISBN: 978-3-319-30927-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics