We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

A nomadic ad-hoc web is a type of radio web. MANET depends on the nomadic nodes as it is an infrastructure-less web. Mobile nodes move freely in arbitrary waies altering location from clip to clip. A node may be a transmitter or a receiving system or a router. The deficiency of any centralised substructure in MANET is one of the greatest security concerns in the deployment of radio webs. Thus communicating in MANET maps decently merely if the take parting nodes cooperate in routing without any malicious purpose. MANETs are vulnerable to assorted types of onslaught because of characteristics like uninterrupted altering topology, resource restraints and non handiness of any centralised substructure. Many denial of service ( DoS ) type of onslaughts are possible in the MANET. Deluging onslaught is one of the onslaughts in which malicious node sends the useless packages to devour the valuable web resources. Deluging onslaught is possible largely in on-demand routing protocol. In this chapter, a technique to extenuate the consequence of deluging onslaught in MANET utilizing trust appraisal map in Dynamic Source Routing ( DSR ) is presented.

5.1. Introduction

Ad-hoc webs are simple peer-to-peer webs, self-organized with no fixed substructure. This leads to new exposures which are non known in wired webs. The wireless links and dynamic topology decidedly gives flexibleness in installing. But, at the same clip, security is a major concern in these webs. The radio channels are vulnerable to assorted security onslaughts. Some of the ad-hoc nodes may be victimized in the web by malicious nodes and may indulge in assorted denial-of-service onslaughts [ 58 ] . The deficiency of security models in these webs is one of the major concerns in their large-scale deployment. The proposal is an inaugural towards developing a sap cogent evidence security theoretical account which can observe and forestall a good subset of security onslaughts possible in an ad-hoc environment. This chapter focuses on the execution of deluging onslaughts by neighboring nodes and schemes to forestall this onslaught in ns-2 [ 59 ] [ 60 ] .

Simulation Study Of Flooding Attack Computer... TOPICS SPECIFICALLY FOR YOU

5.2. Trust in MANET

Trust is a critical factor which depends on unsure conditions and is used for determination devising on collaborating with unknown participants [ 61 ] . It includes constitution and updation of trust [ 62 ] [ 63 ] . In general, trust direction and repute direction is believed to be constantly used [ 64 ] but it is non a fact. There lies a difference between the trust and repute. Trust is active while repute is inactive [ 65 ] . Direct observation and recommendation are the two ways used to mensurate trust or repute. Recommendation is merely an attempt to go through one node ‘s trust or repute to another [ 66 ] [ 67 ] . Golbeck [ 68 ] elaborates about three chief belongingss of trust with mention to societal web. Trust can non be wholly transitive in mathematical footings. That is, if A trusts B, and B trusts C, it does non vouch that A trusts C. Second, trust is non needfully symmetric, intending non indistinguishable in both waies. Yonfang [ 69 ] discusses about policy-based trust direction and reputation-based trust direction. Policy based techniques use logical regulations and verifiable belongingss encoded in signed certificates for user entree to resources.

Policy based technique takes binary determination based on which the petitioner is trusted or non and consequently entree is decided. Due to its binary determination methodological analysis it provides less flexibleness. On the other side repute based strategy derives trust based on numerical and computational mechanism.

Trust is an inevitable belongings in the design and analysis of distribution systems [ 70 ] . Trust is a critical portion through which the relationships emerge [ 71 ] . Proper security steps and correct determinations shall be arrived by clear uping the trust relationship. A trust theoretical account involves specification and puting up of trust relationship among entities. Trust modeling is seen as turning technique to stand for trust in digital format. Recently, it has gained significance in supplying security in electronic systems. Current academic work in the countries of Trust screens such facets as analyzing the jobs of current secure systems [ 72 ] [ 73 ] , suggesting theoretical accounts for accomplishing trust in digital systems [ 74 ] [ 75 ] and quantifying or stipulating trust in digital systems [ 76 ] [ 77 ] . The above subdivision depicts some of the bing trust direction strategies developed for MANET environment.

5.3. Routing Protocols

The primary end of routing protocols in ad-hoc web is to set up optimum way or min hops between beginning and finish with minimal operating expense and minimal bandwidth ingestion so that packages are delivered in a timely mode [ 78 ] . A MANET protocol should work efficaciously over a broad scope of networking context from little ad-hoc group to larger Mobile Multihop networks [ 79 ] . Routing protocols can be divided into proactive, reactive and intercrossed protocols, depending on the routing topology. Proactive protocols are typically table-driven, e.g. Finish Sequenced Distance Vector ( DSDV ) protocol. Reactive or source-initiated on-demand protocols, on the contrary, do non sporadically update the routing information. It is propagated to the nodes merely when necessary, e.g. DSR and Ad-hoc On-Demand Distance Vector ( AODV ) . Hybrid protocols make usage of both reactive and proactive attacks e.g. Zone Routing Protocol ( ZRP ) , Zone-Based Hierarchical Link State Routing Protocol ( ZHLS ) etc. [ 25 ] [ 80 ] [ 81 ] . The advantage of proactive routing protocol is that node experiences minimum hold when path is needed and unexpired path is available in the routing tabular array but the disadvantage of proactive routing is that these are non scalable and care of routing table requires significant web resources. In the instance of reactive routing protocol, path between the nodes is searched merely when a node wants to pass on with the other node. To detect the paths they use route find process which in bends uses the implosion therapy method. In this, instigator forwards the RREQ package to its full neighbor ‘s. If neighbour has the path for finish they reply, otherwise frontward the RREQ to the following node. In this manner RREQ package reaches the finish which sends the answer to RREQ. But the method which is used to ease path find is used by the Intruders or the malicious node to devour the web resources which may take to deluging onslaught. The DSR is a reactive unicast routing protocol that utilizes beginning routing algorithm. In beginning routing algorithm, each information package contains complete routing information to make its finish. Additionally, in DSR, each node uses hoarding engineering to keep route information that it has learnt [ 82 ] . There are two major stages in DSR, the path find stage and the path care stage. When a beginning node wants to direct a package, it foremost consults its path cache. If the needed path is available, so the beginning node includes the routing information inside the informations package before directing it. Otherwise, the beginning node initiates a route find operation by airing path petition packages. A path petition package contains references of both the beginning and the finish and a alone figure to place the petition. On having a path petition package, a node checks its path cache. If the node does n’t hold routing information for the requested finish, it appends its ain reference to the path record field of the path petition package. Then, the petition package is forwarded to it ‘s neighbors. To restrict the communicating operating expense of path petition packages, a node processes route petition packages that it has non seen earlier and its reference that is non presented in the path record field. If the path petition package reaches the finish or an intermediate node has routing information to the finish, a path answer package is generated. When the path answer package is generated by the finish, it comprises of references of nodes that have been traversed by the path petition package. Otherwise, the path answer package comprises the references of nodes the path petition package has traversed concatenated with the path in the intermediate node ‘s path cache. After being created, either by the finish or an intermediate node, a path answer package needs a path back to the beginning. There are three possibilities to acquire a backward path. The first 1 is that the node already has a path to the beginning. The 2nd possibility is that the web has symmetric ( bi-directional ) links. The path answer package is sent utilizing the gathered routing information in the path record field, but in a contrary order. In the last instance, there exists a symmetric ( unidirectional ) nexus and a new path find process is initiated to the beginning. The ascertained path is piggy-backed in the path petition package.

In DSR, when the informations link bed detects a nexus disjunction, a ROUTE_ERROR package is sent rearward to the beginning. After having the ROUTE_ERROR package, the beginning node initiates another path find operation. Additionally, all paths incorporating the broken nexus should be removed from the path caches of the immediate nodes when the ROUTE_ERROR package is transmitted to the beginning. DSR has increased traffic operating expense by incorporating complete routing information into each information package, which degrades its routing public presentation [ 83 ] .

5.4. Routing Attacks

The malicious node ( s ) can assail MANET utilizing different ways, such as directing bogus messages several times, bogus routing information, and publicizing bogus links to interrupt routing operations. In the undermentioned sub-section, some of the current routing onslaughts in MANET protocols are discussed.

A. Deluging Attack: Flooding onslaught is a DoS type of onslaught in which the malicious node broadcasts the inordinate false package in the web to devour the available resources so that valid or legitimate user will non be able to utilize the web resources for valid communicating. Because of the limited resource restraints in the MANET, resource ingestion due to deluging onslaught reduces the throughput of the web. The flooding onslaught is possible in about all of the on-demand routing protocols. Depending upon the type of package used to deluge the web, deluging onslaught can be categorized in to two classs.

a ) RREQ Deluging: In the RREQ implosion therapy onslaught, the aggressor broadcasts the many RREQ packages per clip interval to the IP reference which does non be in the web and disables the limited implosion therapy characteristic. On-demand routing protocol uses the path find procedure to obtain the path between the two nodes. In the path discovery the beginning node broadcasts the RREQ packages in the web. Because the precedence of the RREQ control package is higher than informations package, at the high burden besides RREQ packages are transmitted. A malicious node exploits this characteristic of on-demand routing to establish the RREQ implosion therapy onslaught.

B ) Data Implosion therapy: In the information implosion therapy, malicious node flood the web by directing useless informations packages. To establish the informations implosion therapy, foremost malicious node builds a way to all the nodes so sends big sum of bogus informations packages. These useless informations package exhaust the web resources and, therefore, legitimate users are non able to utilize the resources for valid communicating.

B. Black hole Attack: In a black hole onslaught, a malicious node sends fake routing information, claiming that it has an optimal path and causes other good nodes to route informations packages through the malicious 1. For illustration, in AODV, the aggressor can direct a bogus Route Reply ( RREP ) ( including a bogus finish sequence figure that is fabricated to be equal or higher than the 1 contained in the RREQ ) to the beginning node, claiming that it has a sufficiently fresh path to the finish node. This causes the beginning node to choose the path that passes through the aggressor. Therefore, all traffic will be routed through the aggressor and the aggressor can misapply or fling the traffic.

5.5. Methodology

The theoretical account used for sensing and bar of deluging onslaught is distributed concerted theoretical account in which all the node locally run the invasion sensing codification [ 84 ] and cooperate with each other to observe and forestall deluging onslaught in the web. In this work the DSR routing protocol along with the trust [ 84 ] appraisal map is used because the communicating between the nodes in the MANET depends on the cooperation and the trust degree on its neighbors. To cipher the trust degree, the trust appraisal map is used in the path find stage of the basic DSR routing protocol. The map calculates the trust degree of each neighboring node. Assorted parametric quantities which are used for trust appraisal are: Entire figure of RREQ package sent by the neighbour per unit clip, entire figure of package successfully transmitted by the neighbor, Ratio of figure of package received right from the neighbor to the entire figure of standard packages. In the work, based on the relationship of a node with its adjacent node, three classs of trusts are considered, viz. alien, familiarity and friend.

The aliens are the non-trusted node – means that a alien node is a node with minimal trust degree. Initially, when any node joins the web, this trust relationship with all its neighbors are low or negligible and that this node is treated as a alien. Acquaintances are the nodes which have the trust degree between the friends and aliens. A node is acquainted to its neighbor means it has received some packages through that node. Friends are most sure nodes or the nodes with highest trust degree can be treated as friends. Here the higher trust degree means that neighbors had received or transferred many packages successfully through this peculiar node [ 85 ] .

During the path find stage of the DSR routing protocol, the trust value is besides computed for all the neighbors of any node. The consequence of trust appraisal map is the relationship position of all of neighbors as friend, familiarity or alien [ 86 ] .

See a MANET of figure 5.1 with seven nodes, ( n0 to n6 ) where node n1, n2, n3, n4, n5, n6 are the neighboring nodes of node n0. Node n1 and n4 have a friendly relationship with n0, node n2 and n6 are aliens to n0 and n3, and n5 is acquaintance to node n0. These relationships are shown in the friendly relationship table 5.1.

To observe the invasion, in our strategy each node shops a friendly relationship tabular array. Friendship tabular array is used to hive away the relationship position of any node with its neighbors. The friendly relationship tabular array has two columns. First the identifier or name of its full neighbouring node and back its relationship position with the neighbour node that could be friend, familiarity or alien. This tabular array is referred to every clip any node receives the package. Initially when a node joins the webs it is considered a alien. A node is considered a alien if nodes have ne’er sent or received message to or from the neighbor. A node is considered as an familiarity if it ‘s trust degree is neither really low nor excessively high, which means that node receives some package through this neighbor. If node receives many packages to or from any node successfully, so the trust degree is really high and the node is considered a friend. There is really high chance of onslaught from alien but really low chance from friend. Different threshold values are defined for different types of neighbors to go friend, familiarity and alien. Ta and Tf are the threshold values for the familiarity and the friend severally. Along with this every node maintains a local counter to number RREQ that is compared with threshold value of neighbors. If RREQ count is greater than Tf so neighbour is considered as a friend and if it is greater than Ta and less than Tf so neighbour is familiarity, otherwise considered a alien.

To widen the method proposed in [ 87 ] for higher node mobility, we added the construct of hold waiting line. See the state of affairs where the node mobility is really higher. So, relationship position of about all the nodes can be that of a alien or familiarity because to go a friend to its neighbor, node has to send on many packages successfully to its neighbor. But because of the higher mobility, nodes change its place often ; so possibility of friendly relationship is really low. As we know that the threshold value of the alien or familiarity is lower than that of the friend. So if any node sends many RREQ packages per unit clip because of the mobility, so this is considered a misbehavior because it ‘s count exceeds threshold bounds. Then harmonizing to method proposed in [ 94 ] , the neighbour node discards the packages and declares the node as a interloper or malicious node, which is non true. So to cover with such sorts of state of affairss we have added the construct of hold waiting line here.








Fig 5.1: Relationship of Friend- Acquaintance – Stranger in MANET




The relationships are represented as

R ( ni, nj ) = F when T & A ; gt ; =Tf

R ( ni, nj ) =A when Ta & A ; lt ; = T & A ; lt ; Tf

R ( ni, nj ) =S when 0 & A ; lt ; T & A ; lt ; Ta

The threshold trust degree for a alien node to go an familiarity to it ‘s neighbour is represented by Ta and the threshold trust degree for an familiarity node to go a friend of its neighbor is denoted by Tf.

The above relationships are represented as a Friendship tabular array for each node in an ad hoc web. During the path find stage of the DSR Routing protocol, the trust value is besides computed for all the neighbors of any node. The consequence of trust appraisal map is the Association position of all of neighbors as Friend, Stranger or Acquaintance.

Table 5.1: Friendship tabular array















The Association position [ 78 ] discussed above depends upon the trust value and threshold values. The trust values are calculated based on the undermentioned parametric quantities of the nodes. We propose a really simple equation for the computation of trust value.

Te = tanh ( R1+R2+A )


Te = Trust value

R1= Ratio between the figure of packages really forwarded and figure of packages to be forwarded.

R2 = Ratio of figure of packages received from a node but originated from others to entire figure of packages received from it.

A = Acknowledgement spot. ( 0 or 1 )

The threshold trust degree for an unknown node to go known to its neighbor is represented by TK and the threshold trust degree for a known node to go an Acquaintance of its neighbor is denoted by Tc. The Associations are represented as

A ( node x > node Y ) = C when T ? 0.5

A ( node x > node Y ) = K when 0.1 ? T & A ; lt ; 0.5

A ( node x > node Y ) = UK when 0 & A ; lt ; T ?0.1


A= Association,


Besides, the Association between nodes is asymmetric, ( i.e. , ) R ( node x > node Y ) is an Association evaluated by node tens based on trust degrees calculated for its neighbour node Y.

R ( node Y > node x ) is the Association from the friendly relationship tabular array of node Y. This is evaluated based on the trust degrees assigned for its neighbor. Asymmetrical Associations suggest that the way of informations flow may be more in one way. In other words, node ten may non hold trust on node y the same manner as node Y has trust on node ten or frailty versa.

The proposed stairss to observe the implosion therapy onslaught when any node receives the RREQ from its neighbors are as follows:

First of all shop figure of RREQ packages received from neighbour and increment the R [ I ] by one which is a counter maintained by every node.

Checks the type of relationship with friendly relationship tabular array. It could be friend, familiarity or alien.

Compares the R [ i ] with the corresponding threshold values which is a node ‘s maximal figure of RREQ packages that can be allowed from its neighbor.

If the neighbor is friend node so it compares whether the R [ I ] is below the threshold value Tf. Then it forwards the package to following hop, otherwise discards the package and blacklists the node.

If the neighbor is familiarity and the R [ I ] is less than Ta so it forwards the package, otherwise put the node into the hold waiting line and let the node to send on the same packages and analyze its behavior continuously. If still it is misconducting so declare as an interloper and blacklist the node. Otherwise dainty it a normal node.

When any node wants to direct messages to a distant node, its sends the ROUTE REQUEST to all the neighboring nodes. The ROUTE REPLY obtained from its neighbor is sorted by trust evaluations. The beginning selects the most sure way. If it ‘s one hop neighbor node is an Acquaintance, so that way is chosen for message transportation. If it ‘s one-hop neighbour node is known, and if the one hop neighbor of the 2nd best way is an familiarity, take C. Similarly an optimum way is chosen based on the grade of Association bing between the neighbour nodes. Whenever a neighbouring node is a comrade, the message transportation is done instantly. If it is known or unknown, the transportation is done based on the evaluations. This protocol will meet to the DSR protocol if all the nodes in the ad hoc web are comrades.

5.6. Simulation Environment

The public presentations of DSR routing protocol under the presence of malicious node were evaluated utilizing NS-2 simulator. The simulations have been carried out under a broad scope of mobility and traffic scenarios. The end is to analyze the public presentation of the Flooding Attack Prevention algorithm, WLAN throughput and hold in the web.

The DSR routing protocol is used for all simulation and the other simulation parametric quantities are shown in the Table 5.2. The topology of the MANET depends on the intermission clip and mobility velocity. It changes often when intermission clip is less and mobility velocity is more.

Table 5.2: Simulation Parameter




NS-2 ( ver 2.34 )

Simulation Time

500 sec

Number of Mobile Nodes


Transmission Scope

250 m


1000 m Ten 1000 m

Routing Protocol


Maximum Bandwidth

1 Mbps


Cosmic background radiation

Maximum Speed

5 m/s

No. of Malicious node

1 to 5

Packet Size


The sample screen shooting ( fig 5.2 ) of a scenario of 50 Mobile nodes with beginning and finish are as follows:


Fig 5.2: Sample Simulation Scenario with 5 different bunchs of node

5.7. Consequence and Discussion

We compare the public presentation of original DSR protocol in presence of malicious node and the public presentation of proposed technique in presence of malicious node. To measure the public presentation of the system, we used entire figure of RREQ sent and RREQ received in the web as a public presentation matrix. The figure 5.3 shows the graph of entire RREQ sent/received versus malicious node with mobility velocity 5 m/s and intermission clip zero ( 0 ) . It is clear from the graph that entire figure of RREQ package in the web additions with malicious node because malicious node floods the RREQ package in the web.

Fig 5.3: Data Analysis of RREQ Packet Sent

Fig 5.4: Data Analysis of RREQ Packet Received

From the above two figures we see that our algorithm is able to curtail deluging assail up to a sensible extent.

5.8. Chapter Summary

MANET is frequently attacked by malicious nodes. For better MANET, an efficient security theoretical account is needed to counter onslaughts on security. In this chapter, a new trust constitution strategy is used to observe and forestall implosion therapy onslaughts. The trust map is used in DSR protocol. A sensible result is observed. In future, a more sophisticated trust theoretical account may be developed to place a node. The onslaught may be minimized through that theoretical account. The work may farther be extended to malicious node and others to supply a trusty security model against all possible security onslaughts in MANET.

Share this Post!

Send a Comment

Your email address will not be published.

Kylie Garcia

Hi there, would you like to get such a paper? How about receiving a customized one?

Check it out