MANETs performance analysis with dos attack at different routing protocols

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    A Mobile Ad-Hoc Networks (MANET) is widely used in many industrial and people's life applications, such as earth monitoring, natural disaster prevention, agriculture biomedical related applications, and many other areas. Security threat is one of the major aspects of MANET, as it is one of the basic requirements of wireless sensor network, yet this problem has not been sufficiently explored. The main purpose of this paper is to study different MANETs routing protocols with three scenarios of Denial of Service (DoS) attacks on network layer using proactive routing protocol i.e. Optimized Link State Routing (OLSR) and Reactive routing protocols like Ad hoc On-Demand Distance Vector (AODV), Hybrid routing protocols like Geographic Routing Protocol (GRP). Moreover, a comparative analysis of DoS attacks for throughput, Data loss, delay and network load is taken into account. The performance of MANET under the attack is studied to find out which protocol is more vulnerable to the attack and how much is the impact of the attack on both protocols. The simulation is done using OPNET 17.


  • Keywords


    MANET; Routing Protocols; DoS Attacks; AODV; OLSR.

  • References


      [1] Yang, Hao, et al. "Security in mobile ad hoc networks: challenges and solutions." Wireless Communications, IEEE 11.1 (2004): 38-47. http://dx.doi.org/10.1109/MWC.2004.1269716.

      [2] Roopak, Monika, and B. Reddy. "Blackhole Attack Implementation in AODV Routing Protocol." International Journal of Scientific & Engineering Research4.5 (2013): 402-406.

      [3] Begum, Syed Atiya, L. Mohan, and B. Ranjitha. "Techniques for resilience of denial of service attacks in mobile ad hoc networks." Proceedings published by International Journal of Electronics Communication and Computer Engineering3.1 (2012).

      [4] K. Biswas and Md. Liaqat Ali, "Security threats in Mobile Ad-Hoc Network", Master Thesis, Blekinge Institute of Technology" Sweden, 22nd March 2007.

      [5] A.D. Wood and J. Stankovic, "Denial of service in sensor network", IEEE Computer Magazine, vol. 5, no. 10, pp. 54-62J. Clerk, Oct. 2002.

      [6] Von Mulert, Jan, Ian Welch, and Winston KG Seah. "Security threats and solutions in MANETs: A case study using AODV and SAODV." Journal of Network and Computer Applications 35.4 (2012): 1249-1259. http://dx.doi.org/10.1016/j.jnca.2012.01.019.

      [7] Wu, B., Chen, J., Wu, J., Cardei, M. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. [book auth.] X. Shen, and D.-Z. Du (Eds.) Y. Xiao, Wireless/Mobile Network Security, Spinger, 2006.

      [8] OPNET Technologies, www.opnet.com.

      [9] Mohapatra, S., and P. Kanungo. "Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 Simulator." Procedia Engineering 30 (2012): 69-76. http://dx.doi.org/10.1016/j.proeng.2012.01.835.

      [10] Khan, Shafiullah, Nabil Ali Alrajeh, and Kok-Keong Loo. "Secure route selection in wireless mesh networks." Computer Networks 56.2 (2012): 491-503. http://dx.doi.org/10.1016/j.comnet.2011.07.005.

      [11] Remondo, David. "Wireless ad hoc networks: an overview." Network performance engineering. Springer Berlin Heidelberg, 2011. 746-766.

      [12] Sari, Arif, and Beran Necat. "Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism." International Journal of Ad Hoc, Sensor and Ubiquiotus Computing 3 (2012): 79-94. http://dx.doi.org/10.5121/ijasuc.2012.3306.

      [13] Gupta, Anurag, et al. "Improved AODV Performance in DOS and Black Hole Attack Environment." Computational Intelligence in Data Mining-Volume 2. Springer India, 2015. 541-549.

      [14] Mandala, Satria, et al. "Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks." Security in Computing and Communications. Springer Berlin Heidelberg, 2014. 57-67. http://dx.doi.org/10.1007/978-3-662-44966-0_6.

      [15] Tseng, Fan-Hsun, Li-Der Chou, and Han-Chieh Chao. "A survey of black hole attacks in wireless mobile ad hoc networks." Human-centric Computing and Information Sciences 1.1 (2011): 1-16. http://dx.doi.org/10.1186/2192-1962-1-4.

      [16] Jhaveri, Rutvij H., Sankita J. Patel, and Devesh C. Jinwala. "A novel solution for grayhole attack in aodv based manets." Advances in Communication, Network, and Computing. Springer Berlin Heidelberg, 2012. 60-67. http://dx.doi.org/10.1007/978-3-642-35615-5_9.

      [17] Singh, Rajinder, Parvinder Singh, and Manoj Duhan. "An effective implementation of security based algorithmic approach in mobile adhoc networks." Human-centric Computing and Information Sciences 4.1 (2014): 1-14. http://dx.doi.org/10.1186/s13673-014-0007-9.

      [18] Waharte, Sonia, et al. "Routing protocols in wireless mesh networks: challenges and design considerations." Multimedia tools and Applications 29.3 (2006): 285-303. http://dx.doi.org/10.1007/s11042-006-0012-8.

      [19] Aggarwal, Nitin, and Kanta Dhankhar. "Attacks on Mobile Adhoc Networks: A Survey." International Journal of Research in Advent Technology 2.5 (2014): 307-316.

      [20] Sánchez-Casado, L., et al. "Defenses against Packet-Dropping Attacks in Wireless Multihop Ad Hoc networks." Security for Multihop Wireless Networks (2014): 377. http://dx.doi.org/10.1201/b16754-18.

      [21] Vaithiyanathan, S.R. Gracelin, E.N. Elizabeth and S. Radha, 2010a. A novel method for detection and elimination of modification attack and TTL attack in NTP based routing algorithm. Proceedings of the International Conference on Recent Trends in Information, Telecommunication and Computing, Mar. 12-13, IEEE Xplore Press, Kochi, Kerala, pp: 60-64. ISBN: 978-1-4244-5956-8, DOI: 10.1109/ITC.2010.23. http://dx.doi.org/10.1109/ITC.2010.23.

      [22] Patel, Meenakshi, and Sanjay Sharma. "Detection of malicious attack in manet a behavioral approach." Advance Computing Conference (IACC), 2013 IEEE 3rd International. IEEE, 2013. http://dx.doi.org/10.1109/iadcc.2013.651425.


 

View

Download

Article ID: 4609
 
DOI: 10.14419/ijet.v4i2.4609




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.