scholarly journals Design and Efficient Network Investigation of Passive Periodic Drop Attack

2021 ◽  
Vol 13 (0203) ◽  
pp. 110-116
Author(s):  
Sunil Kumar ◽  
Maninder Singh

A Mobile Ad Hoc Network (MANET) is much more vulnerable to various security attacks due to its high mobility, multi-hop communication and the absence of centralized administration. In this paper, we investigate the impact of Jellyfish periodic dropping attack on MANETs under different routing protocols. This investigate is under the class of denial-of-service attack and targets closed loop flows which results in delay and data loss. In this paper, the simulation results are gathered using OPNET network simulator and its effect on network performance is studied by analysing re-transmission attempts, network load and throughput. The results have shown that the impact of Jellyfish periodic dropping attack which reduces the network performance. Performance shows OLSR performs better than AODV under periodic drop attack.

Author(s):  
Mamata Rath ◽  
Bibudhendu Pati ◽  
Binod Kumar Pattanayak

Due to many challenging issues in vehicular ad-hoc networks (VANETs), such as high mobility and network instability, this has led to insecurity and vulnerability to attacks. Due to dynamic network topology changes and frequent network re-configuration, security is a major target in VANET research domains. VANETs have gained significant attention in the current wireless network scenario, due to their exclusive characteristics which are different from other wireless networks such as rapid link failure and high vehicle mobility. In this are, the authors present a Secured and Safety Protocol for VANET (STVAN), as an intelligent Ad-Hoc On Demand Distance Vector (AODV)-based routing mechanism that prevents the Denial of Service attack (DoS) and improves the quality of service for secured communications in a VANET. In order to build a STVAN, the authors have considered a smart traffic environment in a smart city and introduced the concept of load balancing over VANET vehicles in a best effort manner. Simulation results reveal that the proposed STVAN accomplishes enhanced performance when compared with other similar protocols in terms of reduced delay, better packet delivery ratio, reasonable energy efficiency, increased network throughput and decreased data drop compared to other similar approach.


Author(s):  
S. Lahdya ◽  
T. Mazri

Abstract. For the past twenty years, the automotive industry and research organizations have been aiming to put fully autonomous cars on the road. These cars which can be driven without the intervention of a driver, use several sensors and artificial intelligence technologies simultaneously, which allow them to detect the environment in order to merge the information obtained to analyze it, decide on an action, and to implement it. Thus, we are at the dawn of a revolution in the world of transport and mobility, which leads us to ensure the movement of the autonomous car in a safe manner. In this paper, we examine certain attacks on autonomous cars such as the denial of service attack, as well as the impact of these attacks on the last two levels of vehicle autonomy.


Author(s):  
Mamata Rath ◽  
Bibudhendu Pati ◽  
Binod Kumar Pattanayak

Due to many challenging issues in vehicular ad-hoc networks (VANETs), such as high mobility and network instability, this has led to insecurity and vulnerability to attacks. Due to dynamic network topology changes and frequent network re-configuration, security is a major target in VANET research domains. VANETs have gained significant attention in the current wireless network scenario, due to their exclusive characteristics which are different from other wireless networks such as rapid link failure and high vehicle mobility. In this are, the authors present a Secured and Safety Protocol for VANET (STVAN), as an intelligent Ad-Hoc On Demand Distance Vector (AODV)-based routing mechanism that prevents the Denial of Service attack (DoS) and improves the quality of service for secured communications in a VANET. In order to build a STVAN, the authors have considered a smart traffic environment in a smart city and introduced the concept of load balancing over VANET vehicles in a best effort manner. Simulation results reveal that the proposed STVAN accomplishes enhanced performance when compared with other similar protocols in terms of reduced delay, better packet delivery ratio, reasonable energy efficiency, increased network throughput and decreased data drop compared to other similar approach.


2020 ◽  
Vol 12 (6) ◽  
pp. 49-63
Author(s):  
Yasir Mohammed ◽  
Maha Abdelhaq ◽  
Raed Alsaqour

A Mobile Ad-Hoc Network (MANET) is a decentralized network of mobile node that are connected to an arbitrary topology via wireless connections. The breakdown of the connecting links between adjacent nodes will probably lead to the loss of the transferred data packets. In this research, we proposed an algorithm for link prediction (LP) to enhance the link break provision of the ad hoc on-demand remote protocol (AODV). The proposed algorithm is called the AODV Link Break Prediction (AODVLBP). The AODVLBP prevents link breaks by the use of a predictive measure of the changing signal. The AODVLBP was evaluated using the network simulator version 2.35 (NS2) and compared with the AODV Link prediction (AODVLP) and the AODV routing protocols. The simulation results reveal the effectiveness of AODVLBP in improving network performance in terms of average end-to-end delay, packet delivery ratio, packet overhead ratio, and packet drop-neighbour break.


Author(s):  
Salma S. Mohamed ◽  
Abdel-Fatah I. Abdel-Fatah ◽  
Mohamed A. Mohamed

Routing selection and supporting Quality of Service (QoS) are fundamental problems in Mobile Ad Hoc Network (MANET). Many different protocols have been proposed in the literature and some performance simulations are made to address this challenging task. This paper discusses the performance evaluation and comparison of two typical routing protocols; Ad Hoc On-Demand Distance Vector (AODV) and Destination-Sequenced Distance-Vector (DSDV) based on measuring the power consumption in network with varing of the QoS parameters. In this paper, we have studied and analyzed the impact of variations in QoS parameter combined with the choice of routing protocol, on network performance. The network performance is measured in terms of average throughput, packet delivery ratio (PDR), average jitter and energy consumption. The simulations are carried out in NS-3. The simulation results show that DSDV and AODV routing protocols are less energy efficient. The main aim of this paper is to highlight the directions for the future design of routing protocol which would be better than the existing ones in terms of energy utilization and delivery ratio.


2021 ◽  
Vol 18 (4(Suppl.)) ◽  
pp. 1371
Author(s):  
Nasrina M Samir ◽  
Maisarah Musni ◽  
Zurina Mohd Hanapi ◽  
Mohamed Ridzal Radzuan

Directional Compact Geographic Forwarding (DCGF) routing protocol promises a minimal overhead generation by utilizing a smart antenna and Quality of Service (QoS) aware aggregation. However, DCGF was tested only in the attack-free scenario without involving the security elements. Therefore, an investigation was conducted to examine the routing protocol algorithm whether it is secure against attack-based networks in the presence of Denial-of-Service (DoS) attack. This analysis on DoS attack was carried out using a single optimal attacker, A1, to investigate the impact of DoS attack on DCGF in a communication link. The study showed that DCGF does not perform efficiently in terms of packet delivery ratio and energy consumption even on a single attacker.


2012 ◽  
Vol 8 (2) ◽  
pp. 127-152
Author(s):  
Sazia Parvin ◽  
Farookh Khadeer Hussain ◽  
Sohrab Ali

Similar to wired communication, Mobile IP communication is susceptible to various kinds of attacks. Of these attacks, Denial of Service (DoS) attack is considered as a great threat to mobile IP communication. The number of approaches hitherto proposed to prevent DoS attack in the area of mobile IP communication is much less compared to those for the wired domain and mobile ad hoc networks. In this work, the effects of Denial of Service attack on mobile IP communication are analyzed in detail. We propose to use packet filtering techniques that work in different domains and base stations of mobile IP communication to detect suspicious packets and to improve the performance. If any packet contains a spoofed IP address which is created by DoS attackers, the proposed scheme can detect this and then filter the suspected packet. The proposed system can mitigate the effect of Denial of Service (DoS) attack by applying three methods: (i) by filtering in the domain periphery router (ii) by filtering in the base station and (iii) by queue monitoring at the vulnerable points of base-station node. We evaluate the performance of our proposed scheme using the network simulator NS-2. The results indicate that the proposed scheme is able to minimize the effects of Denial of Service attacks and improve the performance of mobile IP communication.


2016 ◽  
Vol 2 (1) ◽  
pp. 48
Author(s):  
André Luiz Nasserala Pires ◽  
Igor Monteiro Moraes

<p>This paper evaluates a denial-of-service attack in<br />information-centric networks based on the Content Centric<br />Networking (CCN) architecture. This attack aims at increasing the<br />content retrieval time. In this attack, both malicious consumers<br />and producers collude, by generating, publishing, and changing<br />content popularity. Malicious contents are stored by intermediate<br />nodes and occupy the cache space that should be occupied by<br />legitimate content. Thus, the probability of a legitimate consumer<br />retrieves content directly from the producer increases as well as<br />the content retrieval time. We evaluate the impact of the attack by<br />varying the number of consumers and producers in collusion, the<br />interest packets rate, and the way malicious contents are<br />requested. Results show if 20% of consumers are malicious and<br />send 500 interests/s each, the content retrieval time experienced by<br />legitimate users increases by 20 times, which shows the<br />effectiveness of the attack.</p>


Sign in / Sign up

Export Citation Format

Share Document