Dynamic source routing under attacks

Mohamed Abdelshafy, Peter John Beaufoy King

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)


MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages. In this paper, we study the performance of both DSR and its flow-state extension routing protocols in the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the performance of flow-state DSR is better than DSR in the presence of all attacks. Flooding attacks are found to dramatically impact all the standard performance metrics. Blackhole attacks significantly worse the packet delivery ratio in a static network using unmodified DSR. All the attacks greatly increase the end-to-end delay; an effect particularly marked in a static network.

Original languageEnglish
Title of host publication2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)
Number of pages7
ISBN (Print)9781467380515
Publication statusPublished - 2015
Event7th International Workshop on Reliable Networks Design and Modeling 2015 - Munich, Germany
Duration: 5 Oct 20157 Oct 2015


Conference7th International Workshop on Reliable Networks Design and Modeling 2015


  • Attack
  • Blackhole
  • DSR
  • Flooding
  • Flow-state
  • Grayhole
  • Routing
  • Security
  • Selfish

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality
  • Control and Systems Engineering


Dive into the research topics of 'Dynamic source routing under attacks'. Together they form a unique fingerprint.

Cite this