Standard on-demand routing protocols in wireless ad hoc networks were not originally designed to deal with security threats. Because of that, malicious users have been finding ways to attack networks. Rushing attacks represent one of such possibilities. In these attacks, malicious nodes forward the Route Request (RREQ) packets, asking for a route, to the destination node quicker than the legitimate nodes do. This is possible because the legitimate nodes only forward the first received RREQ packet for a given route discovery. Besides, the attackers can tamper with either the Medium Access Control or routing protocols to get faster processing. As a result, the path through the malicious nodes is chosen, which renders throughput degradation. We propose here a novel, robust routing scheme to defend ad hoc networks against rushing attacks. Our scheme utilizes the “neighbor map mechanism” to establish robust paths as far as rushing attacks are concerned. The proposed scheme also improves path recovery delay by using, whenever it is possible, route maintenance rather than route discovery. Yet, it is energy efficient. The simulation results show that our proposal is indeed viable.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Xia, L., & Slay, J. (2008). Securing wireless ad hoc networks: Towards a mobile agent security architecture.
Deng H., Li W., Agrawal D. P. (2002) Routing security in wireless ad hoc networks. IEEE Communications Magazine 40(10): 70–75
Agarwal, K., & Awasthi, L. K. (2008). Enhanced AODV routing protocol for ad hoc networks. In 16th IEEE international conference on networks (pp. 1–5).
Hu, Y.-C., Perrig, A., & Johnson, D. B. (2003). Rushing attacks and defense in wireless ad hoc network routing protocol. In 2nd ACM workshop on wireless security (pp. 30–40).
Rawat, A., Vyavahare, P. D., & Ramani, A. K. (2005). Evaluation of rushing attack on secured message transmission (SMT/SRP) protocol for mobile ad hoc networks. In 2005 IEEE international conference on personal wireless communications (pp. 62–66).
Kent S., Lynn C., Seo K. (2000) Secure border gateway protocol (S-BGP). IEEE Journal on Selected Areas in Communications 18(4): 582–592
Papadimitratos P., Haas Z. J. (2003) Secure message transmission in mobile ad hoc networks. Ad Hoc Networks 1: 193–209
Papadimitratos, P., & Haas, Z. J. (2002). Secure routing for mobile ad hoc networks. In SCS communication networks and distributed systems modeling and simulation conference (pp. 193–204).
Dreef, D., Ahari, S., Wu, K., & King, V. (2004). Utilizing the uncertainty of intrusion detection to strengthen security for ad hoc networks. In 3rd International Conference on AD-HOC Networks and Wireless LNCS (Vol. 3158, pp. 82–95)
Thriveni, J., Akekhya, V. L., Deepa, N., Uma, B., Alice, A., Prakash, G. L., et al. (2008). QoS preemptive routing with bandwidth estimation for improved performance in ad hoc networks. In 4th international conference on information and automation for sustainability (pp. 443–448).
Nakamura S., Ohta K., Kato N. (2001) Proposal of dynamic bandwidth allocation technique for low delay/low jitter realtime communication and its evaluation by using CBQ. IEICE Transactions on Communications E84-B(6): 1513–1520
The VINT project: The network simulator—ns-2. Available at http://www.isi.edu/nsnam/ns/.
Johnson, D. B. (1994). Routing in ad hoc networks of mobile hosts. In IEEE computer society workshop on mobile computing systems and applications (pp. 158–163).
Kim H., Han S., Song J. (2006) A routing protocol for throughput enhancement and energy saving in mobile ad hoc networks. International Conference on Computational Science and Applications. LNCS 3981(2): 359–368
Cheng, M. X., Cardei, M., Sun, J., Cheng, X., Wang, L., Xu, Y., et al. (2004). Topology control of ad hoe wrieless networks for energy efficiency. IEEE Transactions on Computers. 53(12), 1629–1635.
About this article
Cite this article
Kim, H., de Oliveira, R., Bhargava, B. et al. A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks. Wireless Pers Commun 70, 1339–1351 (2013). https://doi.org/10.1007/s11277-012-0751-y
- Mobile node
- On-demand routing protocol
- Rushing attack
- Wireless ad hoc network