Skip to main content
Log in

A novel approach for mitigating route request flooding attack in MANET

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for establishing the communication path among nodes is that the nodes should be cooperative. However, in the presence of malicious node, the MANET’s routing protocol such as AODV is vulnerable to different types of flooding attacks. The flooding attack can be continuous or selective. In the available literature, although many researchers have analyzed the network under continuous flooding attack but they have not focussed on selective flooding attack in which an attacker can sometimes behave as a normal and sometimes behave as a malicious. Most of the existing schemes use constant threshold value which lead to a false positive problem in the network. In order to address this issue, a new mechanism called as Mitigating Flooding Attack Mechanism is proposed which is based on a dynamic threshold value and consists of three phases. It makes use of several special nodes called as Flooding-Intrusion Detection System (F-IDS) that are deployed in MANETs in order to detect and prevent flooding attack. The F-IDS nodes are set in promiscuous in order to monitor the behaviour of the node. The simulation results show that the proposed mechanism improves network performance metrics in terms of PDR, throughput and reduces the routing overhead as well as normalized routing load.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19

Similar content being viewed by others

References

  1. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR.

    Google Scholar 

  2. Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.

    Article  Google Scholar 

  3. Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.

    Article  Google Scholar 

  4. Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535.

  5. Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.

    Article  Google Scholar 

  6. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.

    Article  Google Scholar 

  7. Ning, P., & Sun, K. (2004). How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.

    Article  Google Scholar 

  8. Perkins, C.E., Beliding-Royer, E., & Das, S. (2004). Ad hoc on-demand distance vector (AODV) routing (RFC 3561). IETF Internet-Draft MANET working group.

  9. Johnson, D. B., Maltz, D. A. & Hu, Y-C. (2004). The dynamic source routing protocol for mobile ad-hoc network (DSR). IETF Internet Draft.

  10. Jhaveri, R. H., & Patel, N. M. (2015). A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks. Springer Wireless Network, 21(8), 2781–2798. doi:10.1007/s11276-015-0945-9.

    Article  Google Scholar 

  11. Nissar, N., Naja, N., & Jamali, A. (2015). A review and a new approach to reduce routing overhead in MANETs.  Springer Wireless Network, 21(4), 1119–1139. doi:10.1007/s11276-014-0835-6.

    Article  Google Scholar 

  12. Eissa, T., Razak, S. A., Khokhar, R. H., & Samian, N. (2013). Trust-based routing mechanism in MANET: Design and implementation.  Springer Mobile Network Application, 18(5), 666–677. doi:10.1007/s11036-011-0328-0.

    Article  Google Scholar 

  13. Venkataraman, R., Pushpalatha, M., Khemka, R. & Rao, T. R. (2009). Prevention of flooding attacks in mobile ad hoc networks. In Proceedings of the International Conference on Advances in Computing, Communication and Control, pp. 525–529.

  14. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541.

  15. Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334.

  16. Yeung, D.S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting. Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.

    Article  Google Scholar 

  17. Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4.

  18. Yi, P., Zhou, Y. K., Wu, Y., & Ma, J. (2009). Effects of denial of service attack in mobile ad hoc networks. Journal of Shanghai Jiaotong University, 14(5), 580–583. doi:10.1007/s12204-009-0580-7.

    Article  Google Scholar 

  19. Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.

    Article  Google Scholar 

  20. Gada, D., Gogri, R., Rathod, P., Dedhia, Z., Modyin, N., Sanyal, S., et al. (2004). A distributed security scheme for ad hoc networks. ACM, 11(1), 5. doi:10.1145/1031859.1031864.

    Article  Google Scholar 

  21. Yi, P., Dai, Z., Zhong, Y., & Zhang, S. (2005). Resisting flooding attacks in ad hoc networks. In International Conference of Information Technology: Coding and Computing, pp. 657–662.

  22. Desilva, S., & Boppana, R, V. (2005). Mitigating malicious control packet floods in ad hoc networks. In IEEE Wireless Communications and Networking Conference, 4, 2112–2117.

  23. Song, J.-H., Hong, F., & Zhang, Y. (2006). Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In PDCAT, pp. 497–502.

  24. Li, S., Liu, Q., Chen, H., & Tan, M. (2006). A new method to resist flooding attacks in ad hoc networks. In International Conference of Wireless Communications, Networking and Mobile Computing, pp. 1–4.

  25. Kataria, J. (2006). A scheme to control flooding of fake route request in ad-hoc networks. In 3rd International Conference on Computer and Devices for Communication, pp. 198–201.

  26. Guo, Y., Gordon, S., & Perreau, S. (2007). A flow based detection mechanism against flooding attacks in mobile ad-hoc networks. In Proceeding of IEEE WCNC, pp. 3107–3112.

  27. Nadeem, A., & Howarth, M. (2011). Protection of MANETs from a range of attacks using an Intrusion detection and prevention system. Telecommunication System, 52(4), 2047–2058. doi:10.1007/s11235-011-9484-6.

    Article  Google Scholar 

  28. Laeeq, K. (2012). RFAP, A preventive measure against route request flooding attack in MANETS. In IEEE 15th International Multitopic Conference (INMIC), pp. 480–487.

  29. Singh, P., Raj, A., & Chatterjee, D. (2012). Flood tolerant AODV protocol. International Journal of Computer Applications, 53(6), 18–27.

    Article  Google Scholar 

  30. Choudhury, P., Nandi, S., Pal, A., & Debnath, N. C. (2012). Mitigating route request flooding attack in MANET using node reputation. In 10th IEEE International Conference in Industrial Informatics, pp. 1010–1015.

  31. Panos, C., Xenakis, C., Kotzias, P., & Stavrakakis, I. (2014). A specification based intrusion detection engine for infrastructure-less networks. Elsevier Computer Communications, 54, 67–83.

    Article  Google Scholar 

  32. Chaudhary, A., Tiwari, V., & Kumar, A. (2014). A novel intrusion detection system for adhoc flooding attack using fuzzy logic in mobile adhoc networks. In International Conference on Recent Advances and Innovation in Engineering, pp. 1–4.

  33. Ahir, S. A., Marathe, N., & Padiya, P. (2014). IAMTT-new method for resisting network layer denial of service attack on MANET. In 4th International Conference on Communication Systems and Network Technologies (CSNT), pp. 762–766.

  34. Abdelshafy M, A., & King, P. J. (2014). Resisting flooding attacks on AODV. In 8th International Conference on Emerging Security Information System and Technologies.

  35. Jiang, F., Lin, C. H., & Wu, H. W. (2014). Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Elsevier Ad Hoc Networks, 21, 84–96.

    Article  Google Scholar 

  36. Faghihniya, M. J., Hosseini, S. M., & Tahmasebi, M. (2016). Security upgrade against RREQ flooding attack by using balance index on vehicular adhoc network. Springer Wireless Network. doi:10.1007/s11276-016-1259-2.

    Article  Google Scholar 

  37. Rao, D. S., & Rao, P. V. (2016). An efficient RREQ flooding attack avoidance technique for adaptive wireless network. International Journal of applied engineering research, 11(5), 3696–3702.

    MathSciNet  Google Scholar 

  38. The network simulator-ns-2. (2016). http://www.isi.edu/nsnam/ns/.

  39. Gurung, S., & Chauhan, S. (2016). A novel approach for mitigating gray hole attack in MANET. Springer Wireless Network. doi:10.1007/s11276-016-1353-5.

    Article  Google Scholar 

Download references

Acknowledgements

The first author would like to thank Dr. Raman Parti, Director-cum- Principal of JNGEC Sundernagar for providing facilities to carry out research work. The authors would also like to thank the editor and anonymous reviewers for giving the important and valuable comments in improving this paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shashi Gurung.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gurung, S., Chauhan, S. A novel approach for mitigating route request flooding attack in MANET. Wireless Netw 24, 2899–2914 (2018). https://doi.org/10.1007/s11276-017-1515-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1515-0

Keywords

Navigation