Skip to main content
Log in

Effects of denial of service attack in mobile ad hoc networks

  • Published:
Journal of Shanghai Jiaotong University (Science) Aims and scope Submit manuscript

Abstract

Mobile ad hoc networks are often deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DoS) attacks launched through compromised nodes or intruders. In this paper, we investigated the effects of flooding attacks in network simulation 2 (NS-2) and measured the packet delivery ratio and packet delay under different flooding frequencies and different numbers of attack nodes. Simulation results show that with the increase the flooding frequencies and the numbers of attack nodes, network performance drops. But when the frequency of flooding attacks is greater than a value, the performance decrease gets smooth. Meanwhile the packet delay firstly increases and then declines to a value of stability at the end.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. RFC 2501, Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations [S].

  2. Yi Ping, Dai Zhou-lin, Zhong Yi-ping, et al. Resisting flooding attacks in ad hoc networks [C]// Proceedings of International Conference on Information Technology: Coding and Computing (ITCC2005). Las Vegas, USA: IEEE Press, 2005: 657–662.

    Google Scholar 

  3. Desilva S, Boppana R V. Mitigating malicious control packet floods in ad hoc networks [C]// Proceedings of 2005 IEEE Wireless Communications and Networking Conference (WCNC2005). [s.l.]: IEEE, 2005: 2112–2117.

  4. Guo Ying-hua, Perreau S. Trace flooding attack in mobile ad hoc networks [C]// Proceedings of 3rd International Conference on Intelligent Sensors, Sensor Networks and Information (ISSNIP 2007). NJ, USA: IEEE, 2007: 657–662.

    Google Scholar 

  5. Guo Ying-hua, Gordon S, Perreau S. A flow based detection mechanism against flooding attacks in mobile ad hoc networks [C]// Proceedings of 2007 IEEE Wireless Communications and Networking Conference (WCNC2007). [s.l.]: IEEE, 2007: 3105–3110.

  6. Xia Zheng-you, Wang Lang. DIMH: A novel model to detect and isolate malicious hosts for mobile ad hoc network [J]. Computer Standards & Interfaces, 2006, 58(6): 660–669.

    Article  Google Scholar 

  7. Yi Ping, Zou Fu-tai, Jiang Xing-hao, et al. Mutiagent cooperative intrusion response in mobile ad hoc networks [J]. Journal of Systems Engineering and Electronics, 2007, 18(4): 785–794.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ping Yi  (易 平).

Additional information

Foundation item: the Shanghai Municipal Natural Science Foundation (No. 09ZR1414900), the National High Technology Research and Development Program (863) of China (Nos. 2006AA01Z436, 2007AA01Z452 and 2009AA01Z118)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yi, P., Zhou, Yk., Wu, Y. et al. Effects of denial of service attack in mobile ad hoc networks. J. Shanghai Jiaotong Univ. (Sci.) 14, 580–583 (2009). https://doi.org/10.1007/s12204-009-0580-7

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12204-009-0580-7

Key words

CLC number

Navigation