Performance evaluation of mobile ad hoc networks under flooding-based attacks

A mobile ad hoc network MANET is an open wireless network that comprises a set of mobile, decentralized, and self-organized nodes. Its properties render its environment susceptible to different types of attacks, which can paralyze the mobile nodes in MANET. A particularly dangerous type of attack is run primarily under flooding bogus packet mechanisms, such as hello floods, routing table overflows, exploitation of node penalizing schemes, and resource consumption attack RCA. Flooding-based attacks impose severe effects because they are intended to consume MANET resources, such as bandwidth, node memory, and battery power. Therefore, identifying such effects facilitates the development of countermeasures against the intrusions. In this paper, we introduce a simulation-based study on the effects of RCA on MANET. QualNet v5.0.2 is used to examine the severity of the effects on MANET performance metrics in terms of throughput, end-to-end delay, energy consumption, and routing overhead. The effects of RCA are also monitored under two combinations of four factors: we first vary the number of attackers and attackers' positions, and then modify the attackers' radio range and flooding rate. We also examine the effect of flooding mechanism on the energy consumed by resource consumption attackers. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Ren-Hung Hwang,et al.  A novel efficient power-saving MAC protocol for multi-hop MANETs , 2013, Int. J. Commun. Syst..

[2]  Charles E. Perkins,et al.  Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.

[3]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[4]  A B M Shawkat Ali,et al.  Classifying different denial-of-service attacks in cloud computing using rule-based learning , 2012, Secur. Commun. Networks.

[5]  Elmar Gerhards-Padilla,et al.  TOGBAD - an approach to detect routing attacks in tactical environments , 2011, Secur. Commun. Networks.

[6]  Imrich Chlamtac,et al.  Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.

[7]  J. J. Garcia-Luna-Aceves,et al.  An end-to-end approach to secure routing in MANETs , 2010, Secur. Commun. Networks.

[8]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[9]  Qijun Gu,et al.  Analysis of area-congestion-based DDoS attacks in ad hoc networks , 2007, Ad Hoc Networks.

[10]  Deepinder P. Sidhu,et al.  Open shortest path first (OSPF) routing protocol simulation , 1993, SIGCOMM 1993.

[11]  Subramaniam Shamala,et al.  A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks , 2012, Int. J. Commun. Syst..

[12]  Uyen Trang Nguyen,et al.  A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.

[13]  Azzedine Boukerche,et al.  Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.

[14]  Praveen Joshi Security issues in routing protocols in MANETs at network layer , 2011, WCIT.

[15]  Khadijah Wan Mohd Ghazali,et al.  Flooding Distributed Denial of Service Attacks-A Review , 2011 .

[16]  Ivan Stojmenovic,et al.  Position-based routing in ad hoc networks , 2002, IEEE Commun. Mag..

[17]  Biswanath Mukherjee,et al.  A survey on routing algorithms for wireless Ad-Hoc and mesh networks , 2012, Comput. Networks.

[18]  Sunil Taneja,et al.  A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .

[19]  Panagiotis Papadimitratos,et al.  Secure Routing for Mobile Ad Hoc Networks , 2002 .

[20]  Mingzeng Hu,et al.  A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.

[21]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[22]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.

[23]  Andrea J. Goldsmith,et al.  Energy-constrained modulation optimization , 2005, IEEE Transactions on Wireless Communications.

[24]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[25]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.

[26]  N. Asokan,et al.  Securing ad hoc routing protocols , 2002, WiSE '02.

[27]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[28]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[29]  Peter J. Bentley,et al.  Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.

[30]  Ruey-Maw Chen,et al.  Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions , 2012, Int. J. Commun. Syst..

[31]  Georgia Sakellari Performance evaluation of the Cognitive Packet Network in the presence of network worms , 2011, Perform. Evaluation.

[32]  Michael P. Howarth,et al.  Adaptive intrusion detection & prevention of denial of service attacks in MANETs , 2009, IWCMC.

[33]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[34]  Raed A. Alsaqour,et al.  Effect of network parameters on neighbor wireless link breaks in GPSR protocol and enhancement using mobility prediction model , 2012, EURASIP J. Wirel. Commun. Netw..

[35]  Erdal Cayirci,et al.  Security in Wireless Ad Hoc and Sensor Networks , 2009 .

[36]  Haitham S. Hamza,et al.  Secure multicast routing protocols in mobile ad‐hoc networks , 2014, Int. J. Commun. Syst..

[37]  Sanjeev Jain,et al.  A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.

[38]  Yang Lu,et al.  Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .

[39]  Michalis Faloutsos,et al.  Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.

[40]  Erol Gelenbe,et al.  Cognitive packet networks: QoS and performance , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.