Abstract
Security in a mobile ad-hoc network is an essential requirement that helps in preventing attacks from the malicious node. A flooding attack is a type of denial of service attack that consumes the network bandwidth due to flooding of the fake packets by the flooder node. The different forms of flooding attacks are route request flooding attacks and data flooding attacks. In a route request flooding attack, the flooder node exhausts the network resources with a high number of fake request packets in the network whereas in a data flooding attack; the flooder node sends the fake data packets to the destination. In this paper, we have proposed an Anti-Flooding Attack (AFA) scheme that can detect both types of flooding attacks. NS-2.35 simulator is used to validate the efficiency of the proposed scheme under the effect of different mobility speeds and the number of nodes scenario. The simulation results show that the proposed AFA scheme performs better as compared with an existing scheme on the various performance metrics.
Similar content being viewed by others
Data Availability Statement
The authors confirm that the data supporting the findings of this study are available within the article.
References
Murthy, C. S. R., & Manoj, B. S. (2004). Ad hoc wireless networks: Architectures and protocols. Upper Saddle, USA: Prentice Hall PTR.
Deng, H. M., Li, W., & Agrawal, D. P. (2002). Routing security in wireless ad hoc networks. IEEE Communication Magazine, 40(10), 70–75.
Mohanapriya, M., & Krishnamurthi, I. (2014). Modified DSR protocol for detection and removal of selective black hole attack in MANET. Elsevier Computers and Electrical Engineering, 40(2), 530–538.
Medadian, M., Mebadi, A., & Shahri, E. (2009). Combat with Black Hole attack in AODV routing protocol. In IEEE First Asian Himalayas International Conference, pp. 530–535.
Su, M. Y. (2010). Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Elsevier Computer Communication, 34(1), 107–117.
Chang, J. M., Tsou, P. C., Woungang, I., Chao, H. C., & Lai, C. F. (2014). Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE System Journal, 9(1), 65–75.
Ning, P., & Sun, K. (2004). How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Elsevier Ad hoc Network, 3(6), 795–819.
Jhaveri, R. H., Patel, S. J., & Jinwala, D.C. (2012). DoS attacks in mobile ad hoc networks: A survey. In IEEE 2nd International Conference on Advanced Computing & Communication Technologies, pp. 535–541.
Guo, Y., & Perreau, S. (2007). Trace flooding attack in mobile ad hoc networks. In IEEE International Conference on Intelligent Sensors, Sensor Networks and Information, pp. 329–334.
Yeung, D. S., Jin, S., & Wang, X. (2007). Covariance-matrix modeling and detecting Various flooding attacks. IEEE Transaction on Systems, Man and Cybernetics, 37(2), 157–169.
Yi, P., Wu, Y., & MA, J. (2009). Experimental evaluation of flooding attacks in mobile ad hoc networks. In IEEE International Conference on Communications Workshops, pp. 1–4.
Yi, P., Zhou, Y. K., Wu, Y., & Ma, J. (2009). Effects of denial of service attack in mobile ad hoc networks. Journal of Shanghai Jiaotong University, 14(5), 580–583. https://doi.org/10.1007/s12204-009-0580-7.19.Yu,J.,K
Yu, J., Kang, H., Park, D., Bang, H. C., & Kang, D. W. (2013). An in-depth analysis on traffic flooding attacks detection and system using data mining techniques. Journal of Systems Architecture, 59(10), 1005–1012.
Chouhan, N. S., & Yadav, S. (2011). Flooding attacks prevention in MANET. International Journal of Computer Technology and Electronics Engineering (IJCTEE), 1(3), 68–72.
Roshan, K., Prasad, K. R., Upadhayaya, N., & Govardhan, A. (2012). New-fangled method against data flooding attacks in MANET. International Journal of Computer Science & Information Technology (IJCSIT), 4(3), 25.
S. Hakak, S., Anwar, F., Latif, S. A., Gilkar, G., & Alam, M. K. (2014). Impact of packet size and node mobility pause time on average end to end delay and jitter in MANET’s. In IEEE International Conference on Computer and Communication Engineering.
Kumar, S., Alaria, S., & Kumar, V. (2015). Prevention in sleep deprivation attack in MANET. International Journal of Latest Technology in Engineering (IJLTEMAS), 4(2), 139–144.
Bhalodiya, S., & Vaghela, K. (2015). Enhanced detection and recovery from fooding attack in MANETs using AODV routing protocol. International Journal of Computer Applications, 125(4), 10–15.
Jatthap, S., & Dashore, P. (2016). Battery capacity based detection and prevention of fooding attack on MANET. In International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS), 4(9), 89–99.
Rao, D. S., & Padmanabhuni, V. (2016). An efcient RREQ fooding attack avoidance technique for adaptive wireless network. International Journal of Applied Engineering Research (IJAER), 11(5), 3696–3702.
Pandikumar, T., & Desta, H. (2017). RREQ fooding attack mitigation in MANET using dynamic profle based technique. In International Journal of Engineering Science and Computing (IJESC), 7(6), 12700–12705.
Vimal, V., & Nigam, M. J., (2017). Plummeting food based distributed-DoS attack to upsurge networks performance in ad-hoc networks using neighborhood table technique. In Proceedings of the 2017 IEEE Region 10 Conference, pp. 139–144.
Gurung, S., & Chauhan, S. (2017). A novel approach for mitigating route request fooding attack in MANET. Wireless Networks, 23(4), 1–16.
Nithya, B., Nair, A., & Sreelakshmi, A. S. (2018). Detection of RREQ flooding attacks in MANETs data and communication networks (pp. 109–121). Singapore: Springer.
Zant, M. A., & Yasin, A. (2019). Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Hindawi Security and Communication Networks. https://doi.org/10.1155/2019/8249108
Mohammadi, P., & Ghafari, A. (2019). Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis. Wireless Personal Communications, 106, 365–376.
Sbai, O., & Elboukhari, M. (2020). Data flooding intrusion detection system for MANETs using deep learning approach. In Proceedings of the 13th International Conference on Intelligent Systems: Theories and Applications, pp 1–5.
Singh, G., & Joshi, G. (2021). A novel statistical adhoc on-demand distance vector routing protocol technique is using for preventing the mobile adhoc network from flooding attack. Turkish Journal of Turkish Journal of Computer and Mathematics Education, 12(6), 1753–1765.
Nishanth, N., & Mujeeb, A. (2021). Modeling and detection of flooding-based denial of service attacks in wireless ad hoc networks using uncertain reasoning. IEEE Transactions on Cognitive Communications and Networking, 7(3), 893–904.
Nandi, M., & Anusha, K. (2021). An optimized and hybrid energy aware routing model for effective detection of flooding attacks in a manet environment. Wireless Personal Communications. https://doi.org/10.1007/s11277-021-09079-7
Luong, N. T., Nguyen, A. Q., & Hoang., D. (2022). FAPDRP: A flooding attacks prevention and detection routing protocol in vehicular ad hoc network using behavior history and nonlinear median filter transformation. Wireless Networks. https://doi.org/10.1007/s11276-022-03174-8
The network simulator-ns-2. http://www.isi.edu/ nsnam/ns/.
Acknowledgements
Not applicable.
Funding
The authors confirm that for this research no funding was received.
Author information
Authors and Affiliations
Contributions
All authors have contributed equally in this paper. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no competing interests.
Ethical Approval
Not applicable.
Consent to Participate
Not applicable.
Consent for Publication
Not applicable.
Human and Animal Participants
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Mankotia, V., Sunkaria, R.K. & Gurung, S. AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET. Wireless Pers Commun 130, 1161–1190 (2023). https://doi.org/10.1007/s11277-023-10325-3
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-023-10325-3