Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANET

The increase of the technology revolution is encouraging MANET (A Mobile ad-hoc network) to be used in different sectors and for different purposes. MANET can be used in a variety of different ways such as for personal usage, meetings, and recovery and relief from disasters. The demand on this type of network raises security concerns especially in reference to its specific features such as dynamic topology and no central administration point. A MANET is not a conflict-free environment, so many attacks are aimed at it, but the focus of this study is a DoS (Denial of Service) attack. This paper presents a novel method of MrDR (Monitoring, Detection, and Rehabilitation) to detect DoS attacks and it is applied in this experiment specifically on single MANET. The MrDR method is based on a trust concept, which it is assumed is not transitive. In addition, the trust value in the proposed method is something temporal, a short-lived action, and needs to be recalculated due to the dynamic infrastructure of MANETs. The simulation results of using the MrDR method prove that the effectiveness of the use of this method can increase network performance considerably.

[1]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[2]  Brij B. Gupta,et al.  An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET) , 2014 .

[3]  Anupam Joshi,et al.  Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..

[4]  Zhaoyu Liu,et al.  A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..

[5]  Zhu Han,et al.  Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[6]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  Muthumanickam Gunasekaran,et al.  TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks , 2013, IET Inf. Secur..

[8]  S. Aravindh,et al.  A TRUST BASED APPROACH FOR DETECTION AND ISOLATION OF MALICIOUS NODES IN MANET , 2013 .

[9]  Patricia Morreale,et al.  Design of a Mobile Ad Hoc Network Communication App for Disaster Recovery , 2014, 2014 28th International Conference on Advanced Information Networking and Applications Workshops.

[10]  Hirokazu Suzuki,et al.  An Ad Hoc Network in the Sky, SKYMESH, for Large-Scale Disaster Recovery , 2006, IEEE Vehicular Technology Conference.