Defending MANETs against flooding attacks for military applications under group mobility

MANET is an assembly of mobile nodes having the capability of configure any momentarily network without the assistance of any established infrastructure or centralized supervision. Due to the self-arrangement and self maintenance abilities, MANETs become highly vulnerable to various kinds of attacks. So, Security challenges have become a key concern to provide secure communication between mobile nodes. Flooding attack is one of the security threat in which the intruder will overload the network with worthless packets to misuse the bandwidth and resources of the network. In this paper a clustering behavior based reputation mechanism is proposed to identify the flooding malicious nodes in military battlefield network. As in battlefield situation, mainly Group Mobility model is followed, so grouping of nodes in clusters have various advantages. Reputation (assessment of its behavior in the network) of a node is calculated at cluster heads. This strategy has double nature, hence it efficiently fix the false detection of genuine nodes as malicious ones. Strategy is simulated in NS2. Performance of new scheme is compared with AODV protocol based on various performance metrics it is noticed that proposed strategy has better performance in terms of various metrics.

[1]  Soufiene Djahel,et al.  Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.

[2]  Chai-Keong Toh,et al.  Ad hoc mobile wireless networks : protocols and systems , 2002 .

[3]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[4]  Karim Konate,et al.  Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.

[5]  William Stallings,et al.  Network Security Essentials: Applications and Standards , 1999 .

[6]  R. Ruppe,et al.  Near Term Digital Radio (NTDR) system , 1997, MILCOM 97 MILCOM 97 Proceedings.

[7]  Wenke Lee,et al.  Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.

[8]  Mun Choon Chan,et al.  On the effectiveness of DDoS attacks on statistical filtering , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[9]  W.K.G. Seah,et al.  Framework for statistical filtering against DDoS attacks in MANETs , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).

[10]  Rutvij H. Jhaveri,et al.  DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.

[11]  Sylvie Perreau,et al.  A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.

[12]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[13]  Stefan Schlott,et al.  Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..

[14]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[15]  Rajendra V. Boppana,et al.  Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[16]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[17]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[18]  Prasenjit Choudhury,et al.  A simulation analysis of flooding attack in MANET using NS-3 , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).

[19]  Liu Ai-fang,et al.  A new AODV based clustering routing protocol , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..

[20]  Narayan C. Debnath,et al.  Mitigating route request flooding attack in MANET using node reputation , 2012, IEEE 10th International Conference on Industrial Informatics.

[21]  Yinghua Guo,et al.  Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks , 2010, 2010 Fourth International Conference on Network and System Security.

[22]  V. Balakrishnan,et al.  Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[23]  Winston Khoon Guan Seah,et al.  Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.

[24]  J.B.D. Cabrera,et al.  Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[25]  V. Rhymend Uthariaraj,et al.  Prevention of denial of service attacks and performance enhancement in Mobile Adhoc networks , 2009, COMSNETS 2009.

[26]  V. Rhymend Uthariaraj,et al.  Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks , 2009, 2009 Sixth International Conference on Information Technology: New Generations.

[27]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[28]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[29]  William Stallings Zhu,et al.  Network Security Essentials : Applications and Standards , 2007 .