A simulation analysis of flooding attack in MANET using NS-3

Mobile Ad hoc Network (MANET) is set up with a group of mobile wireless nodes and is devoid of any dedicated routers or base stations. The wireless nodes move around freely and mutually cooperate with each other in routing and forwarding packets without the support of any fixed infrastructure or centralized administration. The topology is highly dynamic, making the routing procedure more difficult and insecure. The wireless nodes of MANET are thus susceptible to compromise and are particularly vulnerable to denial of service (DoS) attacks launched by malicious nodes or intruders. Flooding attack is one such type of DoS attack, in which a compromised node floods the entire network by sending a large number of fake RREQs to nonexistent nodes in the network, thus resulting in network congestion. In this paper, the security of MANET AODV routing protocol is investigated by identifying the impact of flooding attack on it. A simulation study of the effects of flooding attack on the performance of the AODV routing protocol is presented. The simulation environment is implemented by using the NS-3 network simulator. It is observed that due to the presence of such malicious nodes, average percentage of packet loss in the network, average routing overhead and average bandwidth requirement — all increases, thus degrading the performance of MANET significantly.

[1]  Mihaela Cardei,et al.  Routing Security in Ad Hoc Wireless Networks , 2010 .

[2]  Yi Yang,et al.  Generic Threats to Routing Protocols , 2006, RFC.

[3]  George F. Riley,et al.  The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.

[4]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[5]  Winston Khoon Guan Seah,et al.  Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.

[6]  David A. Maltz,et al.  The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.

[7]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[8]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[9]  G. F. Riley Large-scale network simulations with GTNetS , 2003, Proceedings of the 2003 Winter Simulation Conference, 2003..

[10]  Klaus Wehrle,et al.  A Performance Comparison of Recent Network Simulators , 2009, 2009 IEEE International Conference on Communications.

[11]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[12]  Sachin Kumar Gupta,et al.  Routing Protocols in Mobile Ad-hoc Networks \ , 2011 .

[13]  Sugata Sanyal,et al.  Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.

[14]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[15]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[16]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[17]  H. Bakht Routing protocols for mobile ad hoc networks , 2005 .

[18]  Eryk Dutkiewicz,et al.  A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.