Open Access Open Access  Restricted Access Subscription Access

A Study on the Vulnerability of AODV Routing Protocol to Resource Consumption Attack


Affiliations
1 School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600, Bangi, Selangor, Malaysia
2 Department of Electrical, Electronics and Systems Engineering, Faculty of Engineering, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia
 

A Mobile Ad Hoc Network (MANET) is one of the up-to-date technologies supporting communication of mobile devices. It consists of an open environment that comprises a set of mobile, decentralized, and self-organized nodes. MANET is harder to be secured than the other types of static networks. There are many types of attacks that could paralyze the life of the mobile nodes in MANET. One of the most dangerous attacks is the Denial of Service attack (DoS), which in turn could be performed through the Resource Consumption Attack (RCA) over Ad-hoc On demand Distance Vector (AODV) routing protocol. This paper analyzes and studies the RCA effecting factors on AODV performance metrics namely throughput and end-to-end delay under varying the number of connections between the source and the destination and number of RCA attackers number.

Keywords

MANET, Resource Consumption Attack, Denial of Service Attack, AODV Routing Protocol
User

  • Agrawal S, Jain S and Sharma S (2011), A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks. Journal of Computing, Vol.3, No.1, pp.41-48.
  • Alsaqour R A, Abdelhaq M S and Alsukour O A (2012), Effect of network parameters on neighbor wireless link breaks in GPSR protocol and enhancement using mobility prediction model, EURASIP Journal on Wireless Communications and Networking, 171.
  • Cayirci E and Rong C (2009), Security in wireless ad hoc and sensor networks: Wiley Online Library.
  • Deng H, Li W and Agrawal D P (2002), Routing security in wireless ad hoc networks, IEEE Communications Magazine, Vol.40, No.10, pp.70-75.
  • Gerhards-Padilla E, Aschenbruck N, Martini P, Jahnke M and Tolle J (2007), Detecting black hole attacks in tactical MANETs using topology graphs. Paper presented at the 32nd IEEE Conference on Local Computer Networks, LCN 2007.
  • Ghazali K W M and Hassan R (2011), Flooding Distributed Denial of Service Attacks-A Review, Journal of Computer Science, Vol.7, No.8, pp.1218-1223.
  • Giordano S (2002), Mobile ad hoc networks, Handbook of wireless networks and mobile computing, pp.325-346.
  • Karlof C and Wagner D (2003), Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1(2), 293-315.
  • Kurosawa S, Nakayama H, Kato N, Jamalipour A and Nemoto Y (2007), Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method, International Journal of Network Security, Vol.5, No.3, pp.338-346.
  • Marti S, Giuli TJ, Lai K and Baker M (2000), Mitigating routing misbehavior in mobile ad hoc networks, Paper presented at the International Conference on Mobile Computing and Networking: Proceedings of the 6 th annual international conference on Mobile computing and networking.
  • Perkins C E and Royer E M. (1999), Ad-hoc on-demand distance vector routing, Paper presented at the Second IEEE Workshop on Mobile Computing Systems and Applications, WMCSA’99.
  • Scalable Network Technology (SNT). Electronic References. Retrieved Jun. 25, 2012, from http://www.scalablenetworks.com/content.
  • Taneja S and Kush A (2010), A Survey of routing protocols in mobile ad hoc networks. International Journal of Innovation, Management and Technology, Vol.1, No.3, pp.2010-0248.
  • Wallenta C, Kim J, Bentley P J and Hailes S (2010), Detecting interest cache poisoning in sensor networks using an artificial immune algorithm, Applied Intelligence, Vol.32, No.1, pp.1-26.
  • Wang D, Hu M and Zhi H (2008), A survey of secure routing in ad hoc networks. Paper presented at the The Ninth International Conference on Web-Age Information Management, WAIM’08.

Abstract Views: 524

PDF Views: 135




  • A Study on the Vulnerability of AODV Routing Protocol to Resource Consumption Attack

Abstract Views: 524  |  PDF Views: 135

Authors

Maha Abdelhaq
School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600, Bangi, Selangor, Malaysia
Rosilah Hassan
School of Computer Science, Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600, Bangi, Selangor, Malaysia
Mahamod Ismail
Department of Electrical, Electronics and Systems Engineering, Faculty of Engineering, Universiti Kebangsaan Malaysia, 43600 UKM Bangi, Selangor, Malaysia

Abstract


A Mobile Ad Hoc Network (MANET) is one of the up-to-date technologies supporting communication of mobile devices. It consists of an open environment that comprises a set of mobile, decentralized, and self-organized nodes. MANET is harder to be secured than the other types of static networks. There are many types of attacks that could paralyze the life of the mobile nodes in MANET. One of the most dangerous attacks is the Denial of Service attack (DoS), which in turn could be performed through the Resource Consumption Attack (RCA) over Ad-hoc On demand Distance Vector (AODV) routing protocol. This paper analyzes and studies the RCA effecting factors on AODV performance metrics namely throughput and end-to-end delay under varying the number of connections between the source and the destination and number of RCA attackers number.

Keywords


MANET, Resource Consumption Attack, Denial of Service Attack, AODV Routing Protocol

References





DOI: https://doi.org/10.17485/ijst%2F2012%2Fv5i11%2F30643