Dynamic source routing under attacks

Mohamed Abdelshafy, Peter John Beaufoy King

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Abstract

MANET routing protocols are designed based on the assumption that all nodes cooperate without maliciously disrupting the operation of the routing protocol. A large number of attack types of varying severity are threatening MANET. Dynamic Source Routing (DSR) is a well-known reactive MANET routing protocol that does not support security of routing messages. In this paper, we study the performance of both DSR and its flow-state extension routing protocols in the presence of blackhole, grayhole, selfish and flooding attacks. We conclude that the performance of flow-state DSR is better than DSR in the presence of all attacks. Flooding attacks are found to dramatically impact all the standard performance metrics. Blackhole attacks significantly worse the packet delivery ratio in a static network using unmodified DSR. All the attacks greatly increase the end-to-end delay; an effect particularly marked in a static network.

Original languageEnglish
Title of host publication2015 7th International Workshop on Reliable Networks Design and Modeling (RNDM)
PublisherIEEE
Pages174-180
Number of pages7
ISBN (Print)9781467380515
DOIs
Publication statusPublished - 2015
Event7th International Workshop on Reliable Networks Design and Modeling 2015 - Munich, Germany
Duration: 5 Oct 20157 Oct 2015

Conference

Conference7th International Workshop on Reliable Networks Design and Modeling 2015
Country/TerritoryGermany
CityMunich
Period5/10/157/10/15

Keywords

  • Attack
  • Blackhole
  • DSR
  • Flooding
  • Flow-state
  • Grayhole
  • MANET
  • Routing
  • Security
  • Selfish

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Safety, Risk, Reliability and Quality
  • Control and Systems Engineering

Fingerprint

Dive into the research topics of 'Dynamic source routing under attacks'. Together they form a unique fingerprint.

Cite this