Javascript must be enabled to continue!
Early Rushing Attack Detection and Prevention in AODV MANETs
View through CrossRef
Abstract
In Mobile Ad hoc Network (MANET), data and route security are the primary concerns. One of the major techniques used to ensure data and route security is an intrusion detection and mitigation system (IDS). MANET attacks can be classified into active and passive attacks. Among active attacks, the rushing attack is one of the basic network layer attacks. In MANET, it early exploits the duplicate suppression mechanism of Ad hoc on-demand distance vector (AODV) protocol by quickly forwarding the RREQ packet to neighboring nodes without processing it, to influence a source node to include the rushed node in its route, which leads to data loss when transmitting the data packet to the correct destination node.
This document proposes the rushing attack detection and prevention algorithm called Early Rushing Attack Detection and Prevention in AODV MANETs (E-RADP) to fill this gap. In our proposed algorithm, instead of a single constant threshold value, a ratio of the RREQ time and hop count, and previous time stamps are introduced into the RREQ packet header. To advance security, threshold value, ratio, and intermediate delay are used for rushing attack detection and prevention processes. For the performance analysis, the network simulator NS2.35 is used. The proposed protocol is compared with AODV, Prevention of Multiple Rushing Attacks Using AODV Routing Protocol (PMRA), and Rushing Attack Prevention with modified AODV (MAODV) based on true positive, true negative, false positive, and false negative values of normal and malicious nodes, and throughput, packet delivery ratio and end-to-end delay. E-RADP improves the rushing attack detection rate (DR), throughput, and packet loss rate (PLR) of existing protocols. It also improves the end-to-end delay (E2ED) of existing protocols when a rushing node is present in a MANET. Thus, the performance analysis shows that E-RADP is highly secure and faster than existing algorithms.
Springer Science and Business Media LLC
Title: Early Rushing Attack Detection and Prevention in AODV MANETs
Description:
Abstract
In Mobile Ad hoc Network (MANET), data and route security are the primary concerns.
One of the major techniques used to ensure data and route security is an intrusion detection and mitigation system (IDS).
MANET attacks can be classified into active and passive attacks.
Among active attacks, the rushing attack is one of the basic network layer attacks.
In MANET, it early exploits the duplicate suppression mechanism of Ad hoc on-demand distance vector (AODV) protocol by quickly forwarding the RREQ packet to neighboring nodes without processing it, to influence a source node to include the rushed node in its route, which leads to data loss when transmitting the data packet to the correct destination node.
This document proposes the rushing attack detection and prevention algorithm called Early Rushing Attack Detection and Prevention in AODV MANETs (E-RADP) to fill this gap.
In our proposed algorithm, instead of a single constant threshold value, a ratio of the RREQ time and hop count, and previous time stamps are introduced into the RREQ packet header.
To advance security, threshold value, ratio, and intermediate delay are used for rushing attack detection and prevention processes.
For the performance analysis, the network simulator NS2.
35 is used.
The proposed protocol is compared with AODV, Prevention of Multiple Rushing Attacks Using AODV Routing Protocol (PMRA), and Rushing Attack Prevention with modified AODV (MAODV) based on true positive, true negative, false positive, and false negative values of normal and malicious nodes, and throughput, packet delivery ratio and end-to-end delay.
E-RADP improves the rushing attack detection rate (DR), throughput, and packet loss rate (PLR) of existing protocols.
It also improves the end-to-end delay (E2ED) of existing protocols when a rushing node is present in a MANET.
Thus, the performance analysis shows that E-RADP is highly secure and faster than existing algorithms.
Related Results
OEE-AODV – Optimized Energy Efficient Routing Protocol for Reliable Data Transmission in FANETS
OEE-AODV – Optimized Energy Efficient Routing Protocol for Reliable Data Transmission in FANETS
Abstract
FANETs are the new means of communication and have been aiding domestic and military applications for a long time now. FANETS are supported by UAV (Unmanned Autono...
Enhanced Security using Multiple paths routine scheme in Cloud-MANETs
Enhanced Security using Multiple paths routine scheme in Cloud-MANETs
AbstractCloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-o...
Effect of NTT on Performance of AODV in a Linear AD HOC Network
Effect of NTT on Performance of AODV in a Linear AD HOC Network
Wireless Ad Hoc Networks (WANETs) are predicted to be prevalent networks in coming future because of their infrastructure-less characteristics that result in self-organization, sel...
A New Multipath AODV Routing Protocol for VANET Based on Expected Link Lifetime
A New Multipath AODV Routing Protocol for VANET Based on Expected Link Lifetime
In Vehicular Ad Hoc Networks (VANETs), the node mobility leads to network topology changed frequently. Due to the vehicle movement, the limited wireless resources and channel fadin...
Comprehensive Performance Analysis of Mobility Models and Routing Protocols in MANETs Using NS3 Simulator
Comprehensive Performance Analysis of Mobility Models and Routing Protocols in MANETs Using NS3 Simulator
Mobile Ad Hoc Networks (MANETs) are dynamic and infrastructure-less networks characterized by high mobility and changing topologies. This study evaluates the performance of three p...
Hyper-ideal Sociality
Hyper-ideal Sociality
Within the literature on ‘rushing rituals’ at institutions of higher education, there is a dominant focus on the creation of cohesion or communitas (Turner 1969) between students. ...
Mitigating Adversarial Attacks Uncertainty Through Interval Analysis
Mitigating Adversarial Attacks Uncertainty Through Interval Analysis
Abstract
The adversarial attack is characterized by a high attack success rate and a fast generation of examples. It is widely used in neural network robustness evaluation ...
Performance Comparison of DSR and AODV Routing Protocols for Soft Delay Deadlines in Wireless Multimedia Sensor Network
Performance Comparison of DSR and AODV Routing Protocols for Soft Delay Deadlines in Wireless Multimedia Sensor Network
Wireless Multimedia Sensor Network (WMSN) is a collection of the vast amount of different types of sensors like camera sensor, video and scalar sensors which are involved in retrie...

