A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs
Raman Preet1 , Shaveta Rani2 , Paramjeet Singh3
- Dept. of Applied Science (Computer Applications), I.K. Gujral Punjab Technical University, Kapurthala, India.
- Dept. of CSE, Gaini Zail Singh Campus College of Engineering and Technology, Bathinda, India.
- Dept. of CSE, Gaini Zail Singh Campus College of Engineering and Technology, Bathinda, India.
Correspondence should be addressed to: kohliramanpreet@yahoo.com.
Section:Research Paper, Product Type: Journal Paper
Volume-6 ,
Issue-1 , Page no. 196-202, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.196202
Online published on Jan 31, 2018
Copyright © Raman Preet, Shaveta Rani, Paramjeet Singh . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Raman Preet, Shaveta Rani, Paramjeet Singh, “A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.196-202, 2018.
MLA Style Citation: Raman Preet, Shaveta Rani, Paramjeet Singh "A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs." International Journal of Computer Sciences and Engineering 6.1 (2018): 196-202.
APA Style Citation: Raman Preet, Shaveta Rani, Paramjeet Singh, (2018). A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs. International Journal of Computer Sciences and Engineering, 6(1), 196-202.
BibTex Style Citation:
@article{Preet_2018,
author = {Raman Preet, Shaveta Rani, Paramjeet Singh},
title = {A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {1 2018},
volume = {6},
Issue = {1},
month = {1},
year = {2018},
issn = {2347-2693},
pages = {196-202},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1658},
doi = {https://doi.org/10.26438/ijcse/v6i1.196202}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i1.196202}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1658
TI - A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs
T2 - International Journal of Computer Sciences and Engineering
AU - Raman Preet, Shaveta Rani, Paramjeet Singh
PY - 2018
DA - 2018/01/31
PB - IJCSE, Indore, INDIA
SP - 196-202
IS - 1
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
709 | 328 downloads | 261 downloads |
Abstract
The inherent characteristics of mobile ad hoc networks make them susceptible to different types of malicious flooding attacks. Data flooding attack is one of them. Such flooding attacks deplete the network bandwidth and other precious resources to a large extent, creating barriers for future communication among legitimate nodes, paralyzing network operations and leading to Denial of Service (DoS) situation. Learning Automata theory has emerged as a useful tool for performing research activities targeting wireless mobile ad hoc networks. In this paper, we present LA-FIDS - a Learning Automata based Flooding Intrusion Detection System that mitigates the effect of data flooding attack in MANETs by detecting and isolating energy draining malicious node from the communication path. The proposed work is an effort to fill the gap mentioned F-IDS scheme, for not mitigating data flooding attack. The proposed mechanism is implemented in NS 2.35 and simulation results show a considerable improvement in network performance as compared to F-IDS scheme in term of various network performance metrics.
Key-Words / Index Term
MANETs, Flooding, Learning Automata, AODV, DoS, QoS
References
[1] J. Sun, “Mobile Ad hoc Networking: A Essential Technology for Pervasive Computing”, In the Proceedings of International Conference on Info-tech and Info-net (ICII) Vol, 3 Beijing, pp. 316-321, 2001.
[2] M. S. Alkatheiri, J. Liu, A. R. Sangi, “AODV Routing Protocol Under Several Routing Attacks in MANETs”, In the Proceedings of IEEE 13th International Conference on Communication Technology (ICII), pp. 614-618, 2011.
[3] A. Mishra, R. Jaiswal, S. Sharma “A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network”, In the Proceedings of 3rd IEEE International Conference - Advance Computing Conference (IACC), pp. 499-504 2013.
[4] S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, Internet Request for comment RFC 2501, Jan 1999.
[5] R. Ramanathan, J. Redi , “A brief overview of ad hoc networks: challenges and directions”, IEEE Communication Magazine, pp. 20-22, 2002
[6] B. Wu, J. Chen, Wu, J. Wu, and M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Network Security, Springer US, pp. 103-135, 2007.
[7] M. O. Pervaiz, M. Cardei and J. Wu, “Routing Security in Ad hoc Wireless Networks”, Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL 33431, pp. 117-142, June 2010.
[8] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, "A survey of Routing Attacks in Mobile Ad hoc Networks", In the Proceedings of Wireless Communications, IEEE Issue 5, pp. 85-91, 2007.
[9] R. H. Khokhar, M. A. Ngadi, S. Mandala, "A Review of Current Routing Attacks In Mobile Ad Hoc Networks", International Journal of Computer Science and Security (IJCSS), Volume 2, Issue 3, pp. 18-29, 2008.
[10] M. Al-Shurman, S.M. Yoo, and S. Park, "Black Hole Attack in Mobile Ad hoc Networks", In the 42nd Annual Southeast Regional Conference ACM (ACMSE 2004), pp. 96-97, 2004.
[11] Y.C. Hu, A. Perrig, D. B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, 2006.
[12] Y.C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad hoc Network Routing Protocols," In the 2nd ACM Workshop on Wireless Security, pp. 30-40, 2003.
[13] P. Yi, Z. Dai, Y. Zhong, and S. Zhang, "Resisting Flooding Attacks in Ad hoc Networks", International Conference on Information Technology: Coding and Computing 2005 (ITCC 2005), vol. 2, pp. 657-662, 2005.
[14] B. Sharma, “Pragmatic Analysis of Energy Conservation in MANETs”, International Journal of Computer Science and Engineering, Vol- 3 Issue -5, pp. 227-230, 2015.
[15] J. Mirkovic and P. Reiher, “A taxonomy of DDoS Attack and DDoS Defense Mechanisms”, ACM Comput. Commun. Review, 34(2), pp.39–53, 2004.
[16] K. S. Narendra, M. Thathachar, “Learning Automata an Introduction”, Prentice-Hall, New York, 1989.
[17] P. Nicopolitidis, G.I. Papadimitriou, P. Sarigiannidis, M. S. Obaidat and A. S. Pomportsis, “Adaptive Wireless Networks Using learning Automata”, IEEE Wireless Communications, 2014.
[18] S. Misra, P.V. Krishna, A. Bhiwal, A. S. Chawla, B. E. Wolfinger and C. Lee, “A Learning Automata-based Fault-tolerant routing Algorithm for Mobile Ad hoc Networks”, Springer –The Journal of Supercomputing, Volume 62 issue 1, pp. 4-23, 2012.
[19] S. Jagannathan, M. J. Zawodniok, “Dynamic Channel Allocation in Wireless Networks using Adaptive Learning Automata”, International Journal of Wireless Information Networks, Volume 18, Issue 4, pp. 295-308, 2011.
[20] S. Gurung, S. Chauhan, “A Novel Approach for Mitigating Route Request Flooding Attack in MANET”, Wired Networks 2017, pp. 1–16, 2017.
[21] C. E. Perkins, “Ad Hoc On-Demand Distance Vector (AODV) Routing,” INTERNET DRAFT - Mobile Ad hoc NETworking (MONET) Working group of the Internet Engineering Task Force (IETF), 1997.
[22] D. B. Johnson, D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Springer- Mobile Computing, pp. 153-181. Kluwer Academic Publishers, Dordrecht, Netherlands, 1996.
[23] Z. J. Haas and M. R. Pearlman, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, INTERNET DRAFT - Mobile Ad hoc NETworking (MONET) Working group of the Internet Engineering Task Force (IETF), 1997.
[24] Y. Ko and N. H. Vaidya, “Location-Aided Routing (LAR) in Mobile Ad Hoc Networks”, Springer –Wireless Networks, pp. 307-321, 2000.
[25] S. Desilva and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad hoc networks,” IEEE Wireless Communications and Networking Conference (WCNC) USA, vol. 4, pp. 2112-536, 2005.
[26] S. Li, Q. Liu, H. Chen, and M. Tan, “A New Method to Resist Flooding Attacks in Ad Hoc Networks,” In the Proceedings of IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1-4, 2006.
[27] K.A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, "Packet Size based Routing for stable data delivery in Mobile Ad-hoc Networks," IEICE Transactions on Communications, vol. E91-B, no. 7, pp. 2244-2254, 2008.
[28] X. Yang, Y. Shi, M. Zeng, and R. Zhao, "A Novel Method of Network Burst Traffic Real-time prediction based on decomposition," International Conference on Networking (ICN), Lecture Notes in Computer Science, vol. 3420, pp. 784793, 2005.
[29] H. Kim, R. B. Chitti and J. Song, “Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks”, IEEE Transactions on Consumer Electronics , pp. 579-582, 2010.
[30] S. Akram, I. Zubair, M.H. Islam, “Fully Distributed Dynamically Configurable firewall to Resist DOS”, In the Proceedings of IEEE International Conference. on Networked Digital Technologies, pp. 547-549, 2009
[31] M. Bahl, R. Bhoomarker, S. Zafar, “Distributed Detection of packet flooding in Infrastructure-less Wireless Network- An adaptive approach”, In the Proceedings of IEEE International Conference on Advances in Engineering & Technology (ICAETR), pp. 1-4, 2014