Browse > Article
http://dx.doi.org/10.3837/tiis.2020.09.004

Survivability Analysis of MANET Routing Protocols under DOS Attacks  

Abbas, Sohail (Department of Computer Science, College of Computing and Informatics, University of Sharjah)
Haqdad, Muhammad (Department of Computer Science and I.T, University of Malakand)
Khan, Muhammad Zahid (Department of Computer Science and I.T, University of Malakand)
Rehman, Haseeb Ur (Department of Computer Science and I.T, University of Malakand)
Khan, Ajab (Department of Computer Science and I.T, University of Malakand)
Khan, Atta ur Rehman (College of Engineering and Information Technology, Ajman University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.14, no.9, 2020 , pp. 3639-3662 More about this Journal
Abstract
The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.
Keywords
Ad hoc routing protocols; selfish node; black hole; denial of service; survivability;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Y. Zhou, H. Yang, Y.-H. Hu, and S.-Y. Kung, "Cross-Layer Network Lifetime Maximization in Underwater Wireless Sensor Networks," IEEE Systems Journal (Early Access), vol. 14, no. 1, pp. 220-231, 2020.   DOI
2 I. Yaqoob, I. A. T. Hashem, A. Ahmed, S. A. Kazmi, and C. S. Hong, "Internet of things forensics: Recent advances, taxonomy, requirements, and open challenges," Future Generation Computer Systems, vol. 92, no. 1, pp. 265-275, 2019.   DOI
3 A. R. Khan, A. N. Khan, S. Mustafa, and S. K. u. Zaman, "Impact of mobility on energy and performance of clustering-based power-controlled routing protocols," in Proc. of 13th International Conference on Frontiers of Information Technology (FIT), pp. 252-257, 2015.
4 M. U. Rahman, A. Alam, and S. Abbas, "Investigating the impacts of entity and group mobility models in MANETs," in Proc. of International Conference on Computing, Electronic and Electrical Engineering (ICE Cube), pp. 181-185, 2016.
5 A. R. Khan, S. Ali, S. Mustafa, and M. Othman, "Impact of mobility models on clustering based routing protocols in mobile WSNs," in Proc. of 10th International Conference on Frontiers of Information Technology, pp. 366-370, 2012.
6 F. Khan, S. Abbas, and S. Khan, "An efficient and reliable core-assisted multicast routing protocol in mobile Ad-Hoc network," International Journal of Advanced Computer Science Applications, vol. 7, no. 5, pp. 231-242, 2016.
7 D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks," Ad hoc networking, vol. 5, pp. 139-172, 2001.
8 C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proc. of SIGCOMM '94: Proceedings of the conference on Communications architectures, protocols and applications, pp. 234-244, 1994.
9 T. Clausen and P. Jacquet, "Optimized link state routing protocol (OLSR)," No. RFC 3626, 2003.
10 C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," No. RFC 3561, 2003.
11 N. O. Alsrehin, A. F. Klaib, and A. Magableh, "Intelligent Transportation and Control Systems Using Data Mining and Machine Learning Techniques: A Comprehensive Study," IEEE Access, vol. 7, no. 1, pp. 49830-49857, 2019.   DOI
12 M. Abu Talib, S. Abbas, Q. Nasir, and M. F. Mowakeh, "Systematic literature review on Internet-of-Vehicles communication security," International Journal of Distributed Sensor Networks, vol. 14, no. 12, p. 1550147718815054, 2018.
13 S. Abbas, M. Faisal, H. U. Rahman, M. Z. Khan, and M. Merabti, "Masquerading attacks detection in mobile ad hoc networks," IEEE Access, vol. 6, pp. 55013-55025, 2018.   DOI
14 M. N. Lima, A. L. D. Santos, and G. Pujolle, "A survey of survivability in mobile ad hoc networks," IEEE Communications Surveys & Tutorials, vol. 11, no. 1, pp. 66-77, 2009.   DOI
15 S. M. Bilal and S. Ali, "Review and performance analysis of position based routing in VANETs," Wireless Personal Communications, vol. 94, no. 3, pp. 559-578, 2017.   DOI
16 A. A. Mohammed, K. Xiangjie, L. Li, X. Feng, A. Saeid, S. Zohreh, and T. Amr, "BoDMaS: Bio-inspired Selfishness Detection and Mitigation in Data Management for Ad-hoc Social Networks," Ad Hoc Networks, vol. 55, pp. 119-131, 2017.   DOI
17 T. Liu, Q. Zhao, and L. Zhang, "Modified AODV routing protocol in underwater acoustic networks," in Proc. of Electronic Information and Communication Technology (ICEICT), IEEE International Conference on, pp. 191-194, 2016.
18 H. A. Khattak, M. A. Shah, S. Khan, I. Ali, and M. Imran, "Perception layer security in Internet of Things," Future Generation Computer Systems, vol. 100, pp. 144-164, 2019.   DOI
19 R. Kolandaisamy, R. Md Noor, I. Ahmedy, I. Ahmad, M. Reza Z'aba, M. Imran, and M. Alnuem, "A multivariant stream analysis approach to detect and mitigate DDoS attacks in vehicular ad hoc networks," Wireless Communications Mobile Computing, vol. 2018, 2018.
20 A. Derhab, A. Bouras, M. R. Senouci, and M. Imran, "Fortifying intrusion detection systems in dynamic Ad Hoc and wireless sensor networks," International Journal of Distributed Sensor Networks, vol. 10, no. 12, p. 608162, 2014.   DOI
21 S. Abbas, M. Merabti, and D. Llewellyn-Jones, "On the evaluation of reputation and trust based schemes in mobile ad hoc networks," Security and Communication Networks, vol. 8, no. 18, pp. 4041-4052, 2015.   DOI
22 S. Djahel, F. Nait-Abdesselam, and Z. L. Zhang, "Mitigating packet dropping problem in mobile ad hoc networks: Proposals and challenges," IEEE Communications Surveys & Tutorials, vol. 13, no. 4, pp. 658-672, 2011.   DOI
23 S. Abbas, M. Merabti, and D. Llewellyn-Jones, "A Survey of Reputation Based Schemes for MANET," in Proc. of The 11th Annual Conference on The Convergence of Telecommunications, Networking & Broadcasting, Liverpool, UK, pp. 21-22, 2010.
24 C. Panos, C. Ntantogian, S. Malliaros, and C. Xenakis, "Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks," Computer Networks, vol. 113, pp. 94-110, 2017.   DOI
25 J. Loo, J. L. Mauri, and J. s. H. Ortiz, Mobile ad hoc networks: current status and future trends. CRC Press, 2016.
26 S. P. Khan and V. Gupta, "A Trusted Vector method for Black hole attack prevention on MANET," International Journal of Computer Science and Management Research, 2012.
27 H. Singh, "To Investigate the Performance of MANET Routing Protocols with Varying Node Densities," International Journal of Computer Science and Mobile Applications, vol. 2, no. 10, pp. 01-11, 2014.
28 Pavani,K. et al., "Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack," in Proc. of International Conference on Software Engineering and Mobile Application Modelling and Development (ICSEMA 2012), 2012.
29 A. Muneer, E. A. Fattah, and A. Odeh, "Performance Evaluation of DYMO, AODV and DSR Routing Protocols in MANET," International Journal of Computer Applications, vol. 49(11), pp. 29-33, 2012.   DOI
30 M. K. Mishra, B. K. Pattanayak, A. K. Jagadev, and M. Nayak, "Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach," International Journal of Computer Science Issues, vol. 7, no. 4, 2010.
31 E. F. Ahmed, R. A. Abouhogail, and A. Yahya, "Performance Evaluation of Blackhole Attack on VANET's Routing Protocols," International Journal of Software Engineering & Its Applications, vol. 8, no. 9, 2014.
32 S. Gupta, B. Bhushan, C. Nagpal, and R. Chawla, "Impact of Malicious Nodes Concentration on MANET performance," International Journal of Computer Science Applications & Information Technologies, vol. 1, no. 1, 2013.
33 R. E. Thorup, "Implementing and evaluating the DYMO routing protocol," Aarhus Universitet, Datalogisk Institut, 2007.
34 E. Taqieddin, A. Miller, and S. Jagannathan, "Survivability and reliability analysis of the trusted link state routing protocol for wireless AD HOC networks," International Journal of Wireless & Mobile Networks (IJWMN), vol. 3, no. 2, pp. 77-89, 2011.   DOI
35 Usha and Bose, "Comparing The Impact of Blackhole and Grayhole Attacks in Mobile Adhoc Networks," Journal of Computer Science, vol. 8, no. 11, pp. 1788-1802, 2012.   DOI
36 B. Awerbuch, R. Curtmola, D. Holmer, H. Rubens, and C. Nita-Rotaru, "On the survivability of routing protocols in ad hoc wireless networks," in Proc. of First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SecureComm), pp. 327-338, 2005.
37 T. Qiu, N. Chen, K. Li, M. Atiquzzaman, and W. Zhao, "How can heterogeneous internet of things build our future: A survey," IEEE Communications Surveys & Tutorials, vol.20, no.3, pp.2011-2027, 2018.   DOI
38 S. Xu, Y. Li, Y. Gao, Y. Liu, and H. Gacanin, "Opportunistic coexistence of LTE and WiFi for future 5G system: experimental performance evaluation and analysis," IEEE Access, vol. 6, pp. 8725-8741, 2017.   DOI
39 F. Xing and W. Wang, "On the survivability of wireless ad hoc networks with node misbehaviors and failures," IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 3, pp. 284-299, 2010.   DOI
40 P. Michiardi and R. Molva., "Simulation-based analysis of security exposures in mobile ad hoc networks," in Proc. of European Wireless Conference, pp. 15-17, 2002.
41 O. Younes and N. Thomas, "Analysis of the expected number of hops in mobile ad hoc networks with random waypoint mobility," Electronic Notes in Theoretical Computer Science, vol. 275, pp. 143-158, 2011.   DOI
42 M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, and M. Debbah, "A tutorial on UAVs for wireless networks: Applications, challenges, and open problems," IEEE Communications Surveys and Tutorials, vol. 21, no. 3, pp.2334-2360, 2019.   DOI
43 X.-Y. Li, P.-J. Wan, Y. Wang, and C.-W. Yi, "Fault tolerant deployment and topology control in wireless ad hoc networks," Wireless Communications and Mobile Computing, vol. 4, no. 1, pp. 109-125, 2004.   DOI
44 S. Abbas, M. Merabti, K. Kifayat, and T. Baker, "Thwarting Sybil Attackers in Reputation-based Scheme in Mobile Ad hoc Networks," KSII Transactions on Internet Information Systems, vol. 13, no. 12, 2019.