A Study on the Vulnerability of AODV Routing Protocol to Resource Consumption Attack

A Mobile Ad Hoc Network (MANET) is one of the up-to-date technologies supporting communication of mobile devices. It consists of an open environment that comprises a set of mobile, decentralized, and self-organized nodes. MANET is harder to be secured than the other types of static networks. There are many types of attacks that could paralyze the life of the mobile nodes in MANET. One of the most dangerous attacks is the Denial of Service attack (DoS), which in turn could be performed through the Resource Consumption Attack (RCA) over Ad-hoc On demand Distance Vector (AODV) routing protocol. This paper analyzes and studies the RCA effecting factors on AODV performance metrics namely throughput and end-to-end delay under varying the number of connections between the source and the destination and number of RCA attackers number.

[1]  Dharma P. Agrawal,et al.  Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..

[2]  Khadijah Wan Mohd Ghazali,et al.  Flooding Distributed Denial of Service Attacks-A Review , 2011 .

[3]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[4]  Mingzeng Hu,et al.  A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[5]  Silvia Giordano,et al.  Mobile ad hoc networks , 2002 .

[6]  Sunil Taneja,et al.  A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .

[7]  Jens Tölle,et al.  Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .

[8]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[9]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[10]  Raed A. Alsaqour,et al.  Effect of network parameters on neighbor wireless link breaks in GPSR protocol and enhancement using mobility prediction model , 2012, EURASIP J. Wirel. Commun. Netw..

[11]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[12]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[13]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[14]  Peter J. Bentley,et al.  Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.