DOI QR코드

DOI QR Code

Analysis of MANET's Routing Protocols, Security Attacks and Detection Techniques- A Review

  • Amina Yaqoob (Department of Computer Science and Information Technology, University of Lahore, Gujrat Campus) ;
  • Alma Shamas (Department of Computer Science and Information Technology, University of Lahore, Gujrat Campus) ;
  • Jawwad Ibrahim (Department of Computer Science and Information Technology, University of Lahore, Gujrat Campus)
  • Received : 2024.06.05
  • Published : 2024.06.30

Abstract

Mobile Ad hoc Network is a network of multiple wireless nodes which communicate and exchange information together without any fixed and centralized infrastructure. The core objective for the development of MANET is to provide movability, portability and extensibility. Due to infrastructure less network topology of the network changes frequently this causes many challenges for designing routing algorithms. Many routing protocols for MANET have been suggested for last few years and research is still going on. In this paper we review three main routing protocols namely Proactive, Reactive and Hybrid, performance comparison of Proactive such as DSDV, Reactive as AODV, DSR, TORA and Hybrid as ZRP in different network scenarios including dynamic network size, changing number of nodes, changing movability of nodes, in high movability and denser network and low movability and low traffic. This paper analyzes these scenarios on the performance evaluation metrics e.g. Throughput, Packet Delivery Ratio (PDR), Normalized Routing Load(NRL) and End To-End delay(ETE).This paper also reviews various network layer security attacks challenge by routing protocols, detection mechanism proposes to detect these attacks and compare performance of these attacks on evaluation metrics such as Routing Overhead, Transmission Delay and packet drop rates.

Keywords

References

  1. G. Jayakumar and G. Gopinath, "Ad Hoc Wireless Networks Routing Protocols - A Review," Journal of Computer Science, vol. 3, no. 8. pp. 574-582, 2007.  https://doi.org/10.3844/jcssp.2007.574.582
  2. A. Hinds, M. Ngulube, S. Zhu, and H. Al-Aqrabi, "A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)," Int. J. Inf. Educ. Technol., vol. 3, no. 1, pp. 1-5, 2013.  https://doi.org/10.7763/IJIET.2013.V3.223
  3. A. Gupta, "Review of Various Routing Protocols for MANETs," Int. J. Inf. Electron. Eng., vol. 1, no. 3, 2011. 
  4. S. Prakash, R. Kumar, B. Nayak, and M. K. Yadav, "A Survey on Reactive Protocols for Mobile Ad Hoc Networks ( MANET )," Proc. 5th Natl. Conf. INDIACom-2011, 2011. 
  5. S. Kumar, M. Goyal, D. Goyal, and R. C. Poonia, "Routing protocols and security issues in MANET," 2017 Int. Conf. Infocom Technol. Unmanned Syst. Trends Futur. Dir. ICTUS 2017, vol. 2018-Janua, no. 4, pp. 818-824, 2018 
  6. A. Bhattacharyya, A. Banerjee, D. Bose, H. N. Saha, and D. Bhattacharjee, "Different types of attacks in Mobile ADHOC Network: prevention and mitigation techniques," Dep. Comput. Sci. Eng. Inst. Eng. Manag. Saltlake, vol. 1, no. 1, 2011. 
  7. P. Manickam and T. G. Baskar, "P ERFORMANCE C OMPARISONS OF R OUTING P ROTOCOLS IN M OBILE A D H OC N ETWORKS," vol. 3, no. 1, pp. 98-106, 2011.  https://doi.org/10.5121/ijwmn.2011.3109
  8. M. K. Gulati and K. Kumar, "Performance Comparison of Mobile Ad Hoc Network Routing Protocols," Int. J. Comput. Networks Commun., vol. 6, no. 2, pp. 127-142, 2014.  https://doi.org/10.5121/ijcnc.2014.6211
  9. H. Narra, Y. Cheng, E. Cetinkaya, J. Rohrer, and J. Sterbenz, "Destination-Sequenced Distance Vector (DSDV) Routing Protocol Implementation in ns-3," no. March, 2012. 
  10. K. E. Kannammal and T. Purusothaman, "An efficient routing protocol for wireless sensor networks," Life Sci. J., vol. 10, no. 2, pp. 1650-1653, 2013. 
  11. C. Cheng, R. Riley, S. P. R. Kumar, and J. J. Garcia-Luna-Aceves, "Loop-free extended Bellman-Ford routing protocol without bouncing effect," pp. 224-236, 1989. 
  12. X. Hong, K. Xu, and M. Gerla, "Scalable routing protocols for mobile ad hoc networks," IEEE Netw., vol. 16, no. 4, pp. 11-21, 2002.  https://doi.org/10.1109/MNET.2002.1020231
  13. R. V Boppana and A. Mathur, "Analysis of the Dynamic Source Routing Protocol for Ad Hoc Networks," Computer (Long. Beach. Calif)., no. December, pp. 1-8, 2005. 
  14. N. Beijar, "Zone Routing Protocol ( ZRP )," Netw. Lab. Helsinki Univ. Technol. Finl., pp. 1-12, 2002. 
  15. S. Barakovi, S. Kasapovi, and J. Barakovi, "Comparison of MANET Routing Protocols in Different Traffic and Mobility Models," Telfor J., vol. 2, no. 1, pp. 8-12, 2010. 
  16. S. Gandhi, N. Chaubey, N. Tada, and S. Trivedi, "Scenario-based performance comparison of reactive, proactive & hybrid protocols in MANET," 2012 Int. Conf. Comput. Commun. Informatics, ICCCI 2012, pp. 0-4, 2012. 
  17. A. U. Salleh, Z. Ishak, N. M. Din, and M. Z. Jamaludin, "Trace analyzer for NS-2," SCOReD 2006 - Proc. 2006 4th Student Conf. Res. Dev. "Towards Enhancing Res. Excell. Reg., no. SCOReD, pp. 29-32, 2006. 
  18. K. Rampurkar, N. Lavande, S. Shilgire, and S. N. Mane, "Study of Routing Overhead and its Protocols," Int. J. Adv. Eng. Manag., vol. 2, no. 2, p. 52, 2017. 
  19. D. Kaur and N. Kumar, "Comparative Analysis of AODV, OLSR, TORA, DSR and DSDV Routing Protocols in Mobile Ad-Hoc Networks," Int. J. Comput. Netw. Inf. Secur., vol. 5, no. 3, pp. 39-46, 2012.  https://doi.org/10.5815/ijcnis.2013.03.05
  20. S. N. Mohammad, "Security Attacks in MANETS (Survey Prospective)," Int. J. Eng. Adv. Technol., no. 3, pp. 2249-8958, 2017. 
  21. T. P. Venkatesan, "Security Attacks and Detection Techniques for MANET," no. April 2014, 2017. 
  22. P. Panda, K. K. Gadnayak, and N. Panda, "SURVEY ARTICLE MANET Attacks and their Countermeasures : A Survey," vol. 2, pp. 319-330, 2013. 
  23. A. Aashima and V. K. Arora, "Detection and Prevention of Wormhole Attack in MANET Using DSR Protocol," IOSR J. Comput. Eng., vol. 16, no. 6, pp. 44-47, 2014. https://doi.org/10.9790/0661-16684447
  24. R. Sharma, "Gray-hole Attack in Mobile Ad-hoc Networks : A Survey," vol. 7, no. 3, pp. 1457-1460, 2016. 
  25. J. Sen, M. G. Chandra, S. G. Harihara, H. Reddy, and P. Balamuralidhar, "A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks," pp. 0-4, 2007. 
  26. M. G. Pineda, J. Lloret, S. Papavassiliou, S. Ruehrup, and C. B. Westphall, "Ad-hoc networks and wireless: ADHOCNOW 2014 International workshops ETSD, MARSS, MWaoN, SecAN, SSPA, and WiSARN Benidorm, Spain, June 22-27, 2014 revised selected papers," Lect. Notes Comput. Sci. (including Subser. Lect. Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 8629, no. June, pp. 5-6, 2015. 
  27. A. Rana, V. Rana, and S. Gupta, "EMAODV : TECHNIQUE TO PREVENT COLLABORATIVE ATTACKS IN MANETs," vol. 70, pp. 137-145, 2015.  https://doi.org/10.1016/j.procs.2015.10.060
  28. N. Gupta and S. N. Singh, "WORMHOLE," pp. 3-6, 2016. 
  29. S. U. Patil, "Gray hole attack detection in MANETs," 2017 2nd Int. Conf. Converg. Technol. I2CT 2017, vol. 2017-Janua, pp. 20-26, 2017. 
  30. S. Dhende, S. Musale, S. Shirbahadurkar, and A. Najan, "SAODV: Black hole and gray hole attack detection protocol in MANETs," Proc. 2017 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2017, vol. 2018-Janua, no. March, pp. 2391-2394, 2018.