DOI QR코드

DOI QR Code

A Simulation Modeling for the Effect of Resource Consumption Attack over Mobile Ad Hoc Network

  • Raed Alsaqour (Department of Information Technology, College of Computing and Informatics, Saudi Electronic University) ;
  • Maha Abdelhaq (Department of Information Technology, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University) ;
  • Njoud Alghamdi (International Journal of Computer Science and Network Security) ;
  • Maram Alneami (International Journal of Computer Science and Network Security) ;
  • Tahani Alrsheedi (International Journal of Computer Science and Network Security) ;
  • Salma Aldghbasi (International Journal of Computer Science and Network Security) ;
  • Rahaf Almalki (International Journal of Computer Science and Network Security) ;
  • Sarah Alqahtani (International Journal of Computer Science and Network Security)
  • Received : 2023.09.05
  • Published : 2023.09.30

Abstract

Mobile Ad-hoc Network (MANET) is an infrastructure-less network that can configure itself without any centralized management. The topology of MANET changes dynamically which makes it open for new nodes to join it easily. The openness area of MANET makes it very vulnerable to different types of attacks. One of the most dangerous attacks is the Resource Consumption Attack (RCA). In this type of attack, the attacker consumes the normal node energy by flooding it with bogus packets. Routing in MANET is susceptible to RCA and this is a crucial issue that deserves to be studied and solved. Therefore, the main objective of this paper is to study the impact of RCA on two routing protocols namely, Ad hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR); as a try to find the most resistant routing protocol to such attack. The contribution of this paper is a new RCA model (RCAM) which applies RCA on the two chosen routing protocols using the NS-2 simulator.

Keywords

Acknowledgement

This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program.

References

  1. A. S. V. Rao and C. Siddhartha, "Two-Step Verification Technique for Isolation of Black hole Attack in MANETs," International Journal of Recent Technology and Engineering (IJRTE), vol. 8, pp. 491-495, 2019. https://doi.org/10.35940/ijrte.D7107.118419
  2. A. Vijaya Krishna and S. Naseera, "A comprehensive and proportional analysis of course-plotting algorithms in MANETs," ARPN Journal of Engineering and Applied Sciences, vol. 13, pp. 3770-3781, 2018.
  3. L. Raja and S. S. Baboo, "An overview of MANET: Applications, attacks and challenges," International Journal of Computer Science and Mobile Computing, vol. 3, pp. 408-417, 2014.
  4. I. Sumra, P. Sellappan, A. Abdullah, and A. Ali, "Security issues and challenges in Manet-Vanet-Fanet: A Survey," EAI Endorsed Transactions on Energy Web, vol. 5, pp. 1-6, 2018. https://doi.org/10.4108/eai.10-4-2018.155884
  5. M. Tariq, H. Fareed, and R. Alsaqour, "Performance analysis of reactive routing protocols in mobile ad hoc network using NS2," ARPN Journal of Engineering and Applied Sciences, vol. 11, pp. 4267-4271, 2016.
  6. H. Alani and R. Alsaqour, "Routing discovery scheme for high mobility in MANET," ARPN Journal of Engineering and Applied Sciences, vol. 12, pp. 536-543, 2017.
  7. A. Al Sharah, M. Alhaj, and F. Al Naimat, "Trade-off between Energy Consumption and Transmission Rate in Mobile Ad-Hoc Network," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, pp. 245-252, 2121. https://doi.org/10.14569/IJACSA.2021.0120330
  8. B. U. I. Khan, R. F. Olanrewaju, F. Anwar, A. R. Najeeb, and M. Yaacob, "A survey on MANETs: architecture, evolution, applications, security issues and solutions," Indonesian Journal of Electrical Engineering and Computer Science, vol. 12, pp. 832-842, 2018. https://doi.org/10.11591/ijeecs.v12.i2.pp832-842
  9. E. M. Royer and C. E. Perkins, "Ad-hoc on-demand distance vector routing," in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, pp. 90-100, 1999.
  10. M. T. Sultan and S. M. Zaki, "Evaluation of energy consumption of reactive and proactive routing protocols in MANET," arXiv preprint arXiv:1706.06322, 2017.
  11. S. M. Alkahtani and F. Alturki, "Performance Evaluation of Different Mobile Ad-hoc Network Routing Protocols in Difficult Situations," (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 12, pp. 158-167, 2021. https://doi.org/10.14569/IJACSA.2021.0120119
  12. M. S. Abdelhaq, R. A. Alsaqour, M. Al-Hubaishi, T. Alahdal, and M. Uddin, "The Impact of Resource Consumption Attack on Mobile Ad-hoc Network Routing," IJ Network Security, vol. 16, pp. 376-381, 2014.
  13. R. van Rijswijk-Deij, A. Sperotto, and A. Pras, "DNSSEC and its potential for DDoS attacks: a comprehensive measurement study," in Proceedings of the 2014 Conference on Internet Measurement Conference, 2014, pp. 449-460.
  14. A. Dhanapal and P. Nithyanandam, "The Slow HTTP DDoS Attacks: Detection, Mitigation and Prevention in the Cloud Environment," Scalable Computing: Practice and Experience, vol. 20, pp. 669-685, 2019. https://doi.org/10.12694/scpe.v20i4.1569
  15. Y. Bai, Y. Mai, and N. Wang, "Performance comparison and evaluation of the proactive and reactive routing protocols for MANETs," in 2017 Wireless Telecommunications Symposium (WTS), Chicago, IL, 2017, pp. 1-5.
  16. T. Issariyakul and E. Hossain, "Introduction to network simulator 2 (NS2)," in Introduction to network simulator NS2, 1st ed: Springer, Boston, MA, 2009, pp. 1-18.
  17. S. Garg, "Performance analysis of AODV and TORA under DDoS attack in MANETs," IJSR International journal of science and research, vol. 3, pp. 297-304, 2014.
  18. R. Singh and T. P. Sharma, "Present Status of Distributed Denial of service (DDoS) attacks in internet world," International Journal of Mathematical, Engineering and Management Sciences, vol. 4, pp. 1008-1017, 2019.
  19. P. Oberoi, S. Mittal, and R. K. Gujral, "ADRCN: A framework to detect and mitigate malicious insider attacks in cloud-based environment on IaaS," International Journal of Mathematical, Engineering and Management Sciences, vol. 4, pp. 654-670, 2019. https://doi.org/10.33889//IJMEMS.2019.4.3-052
  20. A. A. Ajibesin, M. M. Kah, A. T. Ishaq, and C. A. Ajibesin, "Performance Analysis of Topology and Destination Based Routing Protocols in Mobile Ad-Hoc Network Using NS2," in 2019 IEEE 13th International Conference on Application of Information and Communication Technologies (AICT), 2019, pp. 1-6.
  21. A. Alsumayt, J. Haggerty, and A. Lotfi, "Evaluation of detection method to mitigate DoS attacks in MANETs," in 2018 1st International Conference on Computer Applications & Information Security (ICCAIS), 2018, pp. 1-5.
  22. A. Sahoo, A. Shreya, C. S. Dash, I. Priyadarshini, S. Sobhanayak, S. S. Panda, et al., "Performance Evaluation of AODV, DSDV and DSR Routing Protocol For Wireless Adhoc Network," in 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2018, pp. 348-351.
  23. D. Gao, H. Lin, Y. Liu, and A. Jiang, "Minimizing End-to-End Delay Routing Protocol for Rechargeable Wireless Sensor Networks," Adhoc & Sensor Wireless Networks, vol. 34, pp. 77-98, 2016.
  24. N. Muthukumaran, "Analyzing throughput of MANET with reduced packet loss," Wireless Personal Communications, vol. 97, pp. 565-578, 2017. https://doi.org/10.1007/s11277-017-4520-9