Skip to main content
Log in

AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Security in a mobile ad-hoc network is an essential requirement that helps in preventing attacks from the malicious node. A flooding attack is a type of denial of service attack that consumes the network bandwidth due to flooding of the fake packets by the flooder node. The different forms of flooding attacks are route request flooding attacks and data flooding attacks. In a route request flooding attack, the flooder node exhausts the network resources with a high number of fake request packets in the network whereas in a data flooding attack; the flooder node sends the fake data packets to the destination. In this paper, we have proposed an Anti-Flooding Attack (AFA) scheme that can detect both types of flooding attacks. NS-2.35 simulator is used to validate the efficiency of the proposed scheme under the effect of different mobility speeds and the number of nodes scenario. The simulation results show that the proposed AFA scheme performs better as compared with an existing scheme on the various performance metrics.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22
Fig. 23
Fig. 24
Fig. 25
Fig. 26
Fig. 27
Fig. 28

Similar content being viewed by others

Data Availability Statement

The authors confirm that the data supporting the findings of this study are available within the article.

References

  1. Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR.

    Google Scholar 

  2. Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.

    Article  Google Scholar 

  3. Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.

    Article  Google Scholar 

  4. Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535.

  5. Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.

    Article  Google Scholar 

  6. Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.

    Article  Google Scholar 

  7. Ning, P., & Sun, K. (2004). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.

    Article  Google Scholar 

  8. Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541.

  9. Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334.

  10. Yeung, D. S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.

    Article  Google Scholar 

  11. Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4.

  12. Yi, P., Zhou, Y. K., Wu, Y., & Ma, J. (2009). Effects of denial of service attack in mobile ad hoc networks. Journal of Shanghai Jiaotong University, 14(5), 580–583. https://doi.org/10.1007/s12204-009-0580-7.19.Yu,J.,K

    Article  Google Scholar 

  13. Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.

    Article  Google Scholar 

  14. Chouhan, N. S., & Yadav, S. (2011). Flooding attacks prevention in MANET. International Journal of Computer Technology and Electronics Engineering (IJCTEE), 1(3), 68–72.

    Google Scholar 

  15. Roshan, K., Prasad, K. R., Upadhayaya, N., & Govardhan, A. (2012). New-fangled method against data flooding attacks in MANET. International Journal of Computer Science & Information Technology (IJCSIT), 4(3), 25.

    Article  Google Scholar 

  16. S. Hakak, S., Anwar, F., Latif, S. A., Gilkar, G., & Alam, M. K. (2014). Impact of packet size and node mobility pause time on average end to end delay and jitter in MANET’s. In IEEE International Conference on Computer and Communication Engineering.

  17. Kumar, S., Alaria, S., & Kumar, V. (2015). Prevention in sleep deprivation attack in MANET. International Journal of Latest Technology in Engineering (IJLTEMAS), 4(2), 139–144.

    Google Scholar 

  18. Bhalodiya, S., & Vaghela, K. (2015). Enhanced detection and recovery from fooding attack in MANETs using AODV routing protocol. International Journal of Computer Applications, 125(4), 10–15.

    Article  Google Scholar 

  19. Jatthap, S., & Dashore, P. (2016). Battery capacity based detection and prevention of fooding attack on MANET. In International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), 4(9), 89–99.

    Google Scholar 

  20. Rao, D. S., & Padmanabhuni, V. (2016). An efcient RREQ fooding attack avoidance technique for adaptive wireless network. International Journal of Applied Engineering Research (IJAER), 11(5), 3696–3702.

    Google Scholar 

  21. Pandikumar, T., & Desta, H. (2017). RREQ fooding attack mitigation in MANET using dynamic profle based technique. In International Journal of Engineering Science and Computing (IJESC), 7(6), 12700–12705.

    Google Scholar 

  22. Vimal, V., & Nigam, M. J., (2017). Plummeting food based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique. In Proceedings of the 2017 IEEE Region 10 Conference, pp. 139–144.

  23. Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating route request fooding attack in MANET. Wireless Networks, 23(4), 1–16.

    Google Scholar 

  24. Nithya, B., Nair, A., & Sreelakshmi, A. S. (2018). Detection of RREQ flooding attacks in MANETs data and communication networks (pp. 109–121). Singapore: Springer.

    Google Scholar 

  25. Zant, M. A., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Hindawi Security and Communication Networks. https://doi.org/10.1155/2019/8249108

    Article  Google Scholar 

  26. Mohammadi, P., & Ghafari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106, 365–376.

    Article  Google Scholar 

  27. Sbai, O., & Elboukhari, M. (2020). Data flooding intrusion detection system for MANETs using deep learning approach. In Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications, pp 1–5.

  28. Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the mobile adhoc network from flooding attack. Turkish Journal of Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765.

    Google Scholar 

  29. Nishanth, N., & Mujeeb, A. (2021). Modeling and detection of flooding-based denial of service attacks in wireless ad hoc networks using uncertain reasoning. IEEE Transactions on Cognitive Communications and Networking, 7(3), 893–904.

    Article  Google Scholar 

  30. Nandi, M., & Anusha, K. (2021). An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-09079-7

    Article  Google Scholar 

  31. Luong, N. T., Nguyen, A. Q., & Hoang., D. (2022). FAPDRP: A flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wireless Networks. https://doi.org/10.1007/s11276-022-03174-8

    Article  Google Scholar 

  32. The network simulator-ns-2. http://www.isi.edu/ nsnam/ns/.

Download references

Acknowledgements

Not applicable.

Funding

The authors confirm that for this research no funding was received.

Author information

Authors and Affiliations

Authors

Contributions

All authors have contributed equally in this paper. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Vivek Mankotia.

Ethics declarations

Conflict of interest

The authors declare that they have no competing interests.

Ethical Approval

Not applicable.

Consent to Participate

Not applicable.

Consent for Publication

Not applicable.

Human and Animal Participants

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mankotia, V., Sunkaria, R.K. & Gurung, S. AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET. Wireless Pers Commun 130, 1161–1190 (2023). https://doi.org/10.1007/s11277-023-10325-3

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-023-10325-3

Keyword

Navigation