Abstract

Security in MANET is an essential task in preventing the harm that could be caused by malicious nodes in the network. Flooding attack is one of DoS attacks that aim to exhaust the network resources by flooding the network with a lot of fake packets and messages. There are different forms of Flooding attacks, and the most common form is the request one. Request Flooding attack keeps flooding the network with a lot of requests to the fake nodes that do not exist in the network. In this research, we presented a new enhanced AODV protocol AIF AODV that can detect and isolate flooding nodes in the network. NS-2.35 is used to simulate and to prove the efficiency of the proposed technique. The results of the enhanced protocol in terms of Throughput, End to End Delay, PDF, ARE, and NRL are very close to the native AODV without Flooding attack. The comparisons with other models showed that the proposed model AIF_AODV has a better Throughput characteristic.

Highlights

  • Network technology is moving towards changing the wired connection between nodes in the network to a wireless connection which makes the network more flexible

  • The results showed an increase in Packet Delivery Ratio (PDR) up to 95% compared to native Ad Hoc On-Demand Distance Vector (AODV) under attack and a high Detection Rate of the malicious nodes up to 90%

  • The results showed an increase in Packet Delivery Ratio (PDR), decrease in End to End Delay, and increase in Throughput compared to the native AODV under attack

Read more

Summary

Introduction

Network technology is moving towards changing the wired connection between nodes in the network to a wireless connection which makes the network more flexible. Nodes depend on a central node to coordinate the communication between them. Nodes depend on themselves to coordinate the communication process. There are three types of routing protocols: proactive, reactive, and hybrid These protocols are adapted to the changing topology of MANET and appropriate in finding the optimal path between any two nodes that want to communicate with each other. In Passive attacks, the attacker nodes only gather information and data about other nodes in the network without affecting the network operations. Examples of these Passive attacks are Monitoring, Eavesdropping, and Traffic Analysis.

Objectives
Methods
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.