Survivability Analysis of MANET Routing Protocols under DOS Attacks |
Abbas, Sohail
(Department of Computer Science, College of Computing and Informatics, University of Sharjah)
Haqdad, Muhammad (Department of Computer Science and I.T, University of Malakand) Khan, Muhammad Zahid (Department of Computer Science and I.T, University of Malakand) Rehman, Haseeb Ur (Department of Computer Science and I.T, University of Malakand) Khan, Ajab (Department of Computer Science and I.T, University of Malakand) Khan, Atta ur Rehman (College of Engineering and Information Technology, Ajman University) |
1 | Y. Zhou, H. Yang, Y.-H. Hu, and S.-Y. Kung, "Cross-Layer Network Lifetime Maximization in Underwater Wireless Sensor Networks," IEEE Systems Journal (Early Access), vol. 14, no. 1, pp. 220-231, 2020. DOI |
2 | I. Yaqoob, I. A. T. Hashem, A. Ahmed, S. A. Kazmi, and C. S. Hong, "Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges," Future Generation Computer Systems, vol. 92, no. 1, pp. 265-275, 2019. DOI |
3 | A. R. Khan, A. N. Khan, S. Mustafa, and S. K. u. Zaman, "Impact of mobility on energy and performance of clustering-based power-controlled routing protocols," in Proc. of 13th International Conference on Frontiers of Information Technology (FIT), pp. 252-257, 2015. |
4 | M. U. Rahman, A. Alam, and S. Abbas, "Investigating the impacts of entity and group mobility models in MANETs," in Proc. of International Conference on Computing, Electronic and Electrical Engineering (ICE Cube), pp. 181-185, 2016. |
5 | A. R. Khan, S. Ali, S. Mustafa, and M. Othman, "Impact of mobility models on clustering based routing protocols in mobile WSNs," in Proc. of 10th International Conference on Frontiers of Information Technology, pp. 366-370, 2012. |
6 | F. Khan, S. Abbas, and S. Khan, "An efficient and reliable core-assisted multicast routing protocol in mobile Ad-Hoc network," International Journal of Advanced Computer Science Applications, vol. 7, no. 5, pp. 231-242, 2016. |
7 | D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks," Ad hoc networking, vol. 5, pp. 139-172, 2001. |
8 | C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proc. of SIGCOMM '94: Proceedings of the conference on Communications architectures, protocols and applications, pp. 234-244, 1994. |
9 | T. Clausen and P. Jacquet, "Optimized link state routing protocol (OLSR)," No. RFC 3626, 2003. |
10 | C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," No. RFC 3561, 2003. |
11 | N. O. Alsrehin, A. F. Klaib, and A. Magableh, "Intelligent Transportation and Control Systems Using Data Mining and Machine Learning Techniques: A Comprehensive Study," IEEE Access, vol. 7, no. 1, pp. 49830-49857, 2019. DOI |
12 | M. Abu Talib, S. Abbas, Q. Nasir, and M. F. Mowakeh, "Systematic literature review on Internet-of-Vehicles communication security," International Journal of Distributed Sensor Networks, vol. 14, no. 12, p. 1550147718815054, 2018. |
13 | S. Abbas, M. Faisal, H. U. Rahman, M. Z. Khan, and M. Merabti, "Masquerading attacks detection in mobile ad hoc networks," IEEE Access, vol. 6, pp. 55013-55025, 2018. DOI |
14 | M. N. Lima, A. L. D. Santos, and G. Pujolle, "A survey of survivability in mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol. 11, no. 1, pp. 66-77, 2009. DOI |
15 | S. M. Bilal and S. Ali, "Review and performance analysis of position based routing in VANETs," Wireless Personal Communications, vol. 94, no. 3, pp. 559-578, 2017. DOI |
16 | A. A. Mohammed, K. Xiangjie, L. Li, X. Feng, A. Saeid, S. Zohreh, and T. Amr, "BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks," Ad Hoc Networks, vol. 55, pp. 119-131, 2017. DOI |
17 | T. Liu, Q. Zhao, and L. Zhang, "Modified AODV routing protocol in underwater acoustic networks," in Proc. of Electronic Information and Communication Technology (ICEICT), IEEE International Conference on, pp. 191-194, 2016. |
18 | H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and M. Imran, "Perception layer security in Internet of Things," Future Generation Computer Systems, vol. 100, pp. 144-164, 2019. DOI |
19 | R. Kolandaisamy, R. Md Noor, I. Ahmedy, I. Ahmad, M. Reza Z'aba, M. Imran, and M. Alnuem, "A multivariant stream analysis approach to detect and mitigate DDoS attacks in vehicular ad hoc networks," Wireless Communications Mobile Computing, vol. 2018, 2018. |
20 | A. Derhab, A. Bouras, M. R. Senouci, and M. Imran, "Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 10, no. 12, p. 608162, 2014. DOI |
21 | S. Abbas, M. Merabti, and D. Llewellyn-Jones, "On the evaluation of reputation and trust based schemes in mobile ad hoc networks," Security and Communication Networks, vol. 8, no. 18, pp. 4041-4052, 2015. DOI |
22 | S. Djahel, F. Nait-Abdesselam, and Z. L. Zhang, "Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges," IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 658-672, 2011. DOI |
23 | S. Abbas, M. Merabti, and D. Llewellyn-Jones, "A Survey of Reputation Based Schemes for MANET," in Proc. of The 11th Annual Conference on The Convergence of Telecommunications, Networking & Broadcasting, Liverpool, UK, pp. 21-22, 2010. |
24 | C. Panos, C. Ntantogian, S. Malliaros, and C. Xenakis, "Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks," Computer Networks, vol. 113, pp. 94-110, 2017. DOI |
25 | J. Loo, J. L. Mauri, and J. s. H. Ortiz, Mobile ad hoc networks: current status and future trends. CRC Press, 2016. |
26 | S. P. Khan and V. Gupta, "A Trusted Vector method for Black hole attack prevention on MANET," International Journal of Computer Science and Management Research, 2012. |
27 | H. Singh, "To Investigate the Performance of MANET Routing Protocols with Varying Node Densities," International Journal of Computer Science and Mobile Applications, vol. 2, no. 10, pp. 01-11, 2014. |
28 | Pavani,K. et al., "Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack," in Proc. of International Conference on Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), 2012. |
29 | A. Muneer, E. A. Fattah, and A. Odeh, "Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET," International Journal of Computer Applications, vol. 49(11), pp. 29-33, 2012. DOI |
30 | M. K. Mishra, B. K. Pattanayak, A. K. Jagadev, and M. Nayak, "Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach," International Journal of Computer Science Issues, vol. 7, no. 4, 2010. |
31 | E. F. Ahmed, R. A. Abouhogail, and A. Yahya, "Performance Evaluation of Blackhole Attack on VANET's Routing Protocols," International Journal of Software Engineering & Its Applications, vol. 8, no. 9, 2014. |
32 | S. Gupta, B. Bhushan, C. Nagpal, and R. Chawla, "Impact of Malicious Nodes Concentration on MANET performance," International Journal of Computer Science Applications & Information Technologies, vol. 1, no. 1, 2013. |
33 | R. E. Thorup, "Implementing and evaluating the DYMO routing protocol," Aarhus Universitet, Datalogisk Institut, 2007. |
34 | E. Taqieddin, A. Miller, and S. Jagannathan, "Survivability and reliability analysis of the trusted link state routing protocol for wireless AD HOC networks," International Journal of Wireless & Mobile Networks (IJWMN), vol. 3, no. 2, pp. 77-89, 2011. DOI |
35 | Usha and Bose, "Comparing The Impact of Blackhole and Grayhole Attacks in Mobile Adhoc Networks," Journal of Computer Science, vol. 8, no. 11, pp. 1788-1802, 2012. DOI |
36 | B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, and C. Nita-Rotaru, "On the survivability of routing protocols in ad hoc wireless networks," in Proc. of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), pp. 327-338, 2005. |
37 | T. Qiu, N. Chen, K. Li, M. Atiquzzaman, and W. Zhao, "How can heterogeneous internet of things build our future: A survey," IEEE Communications Surveys & Tutorials, vol.20, no.3, pp.2011-2027, 2018. DOI |
38 | S. Xu, Y. Li, Y. Gao, Y. Liu, and H. Gacanin, "Opportunistic coexistence of LTE and WiFi for future 5G system: experimental performance evaluation and analysis," IEEE Access, vol. 6, pp. 8725-8741, 2017. DOI |
39 | F. Xing and W. Wang, "On the survivability of wireless ad hoc networks with node misbehaviors and failures," IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 3, pp. 284-299, 2010. DOI |
40 | P. Michiardi and R. Molva., "Simulation-based analysis of security exposures in mobile ad hoc networks," in Proc. of European Wireless Conference, pp. 15-17, 2002. |
41 | O. Younes and N. Thomas, "Analysis of the expected number of hops in mobile ad hoc networks with random waypoint mobility," Electronic Notes in Theoretical Computer Science, vol. 275, pp. 143-158, 2011. DOI |
42 | M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, and M. Debbah, "A tutorial on UAVs for wireless networks: Applications, challenges, and open problems," IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp.2334-2360, 2019. DOI |
43 | X.-Y. Li, P.-J. Wan, Y. Wang, and C.-W. Yi, "Fault tolerant deployment and topology control in wireless ad hoc networks," Wireless Communications and Mobile Computing, vol. 4, no. 1, pp. 109-125, 2004. DOI |
44 | S. Abbas, M. Merabti, K. Kifayat, and T. Baker, "Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks," KSII Transactions on Internet Information Systems, vol. 13, no. 12, 2019. |