Early Rushing Attack Detection and Prevention in AODV MANETs

Authors

  • Teamerat M. Asres
  • Getaneh A. Zimbele
  • Tewodros M. Kifle

Keywords:

AODV, Intrusion Prevention, MANET, Ratio, RREQ Time, Rushing Attack, Time Stamp

Abstract

Mobile Ad hoc Network (MANET) attacks can be classified into active and passive attacks. Among active attacks, the rushing attack is one of the basic network layer attacks. In MANET, it early exploits the duplicate suppression mechanism of Ad hoc on-demand distance vector (AODV) protocol by quickly forwarding the RREQ packet to neighboring nodes without processing it, to influence a source node to include the rushed node in its route, which leads to data loss when transmitting the data packet to the correct destination node. This Early Rushing Attack Detection and Prevention in AODV MANETs (E-RADP) paper is proposed to fill this gap.

To advance the security of our proposed algorithm, threshold value, ratio, and intermediate delay are introduced in rushing attack detection and prevention processes. For the performance analysis, the network simulator NS2.35 is used. The proposed protocol is compared with AODV, Prevention of Multiple Rushing Attacks Using AODV Routing Protocol (PMRA), and Rushing Attack Prevention with modified AODV (MAODV) based on true positive, true negative, false positive, and false negative values of normal and malicious nodes, and throughput, packet delivery ratio and end-to-end delay. E-RADP improves the rushing attack detection rate (DR), throughput, and packet loss rate (PLR) of existing protocols. It also improves the end-to-end delay (E2ED) of existing protocols when a rushing node is present in a MANET.  Thus, the performance analysis shows that E-RADP is highly secure and faster than existing algorithms.

References

G. A. Zimbele, T. M. Asres, and T. M. Kifle, “Early rushing attack detection and prevention in AODV MANETs,” Preprint, 8 Oct. 2024. https://doi.org/10.21203/rs.3.rs-5219038/v1.

A. Malik, M. Z. Khan, and S. M. Qaisar, “An efficient approach for the detection and prevention of Gray-Hole attacks in VANETs,” IEEE Access, vol. 11, pp. 46691–46706, 2023. https://doi.org/10.1109/ACCESS.2023.3274650.

S. Vijayalakshmi, S. Bose, G. Logeswari, and T. Anitha, “Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory,” Cyber Security and Applications, vol. 1, p. 100011, 2023. https://doi.org/10.1016/j.csa.2022.100011.

S. Khan, M. Z. Khan, P. Khan, G. Mehmood, A. Khan, and M. Fayaz, “An ant-hocnet routing protocol based on optimized fuzzy logic for swarm of UAVs in FANET,” Wireless Communications and Mobile Computing, vol. 2022, 2022. https://doi.org/10.1155/2022/6783777.

R. A. Jothi, A. L. Jeeva, and V. Palanisamy, “Various attacks and countermeasures in mobile ad hoc networks: A survey,” International Journal of Engineering Research & Technology (IJERT), vol. 3, no. 33, pp. 1–8, 2015.

R. F. Olanrewaju, B. U. I. Khan, F. Anwar, and B. R. Pampori, “MANET security appraisal: Challenges, essentials, attacks, countermeasures & future directions,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 6, pp. 3013–3024, 2020. https://doi.org/10.35940/ijrte.E6537.038620.

S. Sivanesh, and V. R. S. Dhulipala, “Comparative analysis of blackhole and rushing attack in MANET,” Proceedings of the 2019 TEQIP III Sponsored International Conference on Microwave Integrated Circuits, Photonics and Wireless Networks (IMICPW), 2019, pp. 495–499. https://doi.org/10.1109/IMICPW.2019.8933192.

M. Goyal, S. K. Poonia, and D. Goyal, “Attacks finding and prevention techniques in MANET: A survey,” Advances in Wireless and Mobile Communications, vol. 10, no. 5, pp. 1185–1195, 2017.

M. Sharma, and M. Rashid, “Security attacks in MANET – A comprehensive study,” Proceedings of the International Conference on Intelligent Communication and Computational Research (ICICCR-2020), 2020, pp. 1–6. https://doi.org/10.2139/ssrn.3565860.

A. Aranganathan, and C. D. Suriyakala, “Agent based secure intrusion detection and prevention for rushing attacks in clustering MANETs,” International Journal of Engineering & Technology, vol. 7, pp. 22–25, 2018. https://doi.org/10.14419/ijet.v7i2.20.11736.

R. Thilagarasi, and D. Geetha, “Prevention of multiple rushing attack nodes in multicast MANET,” International Journal of Computer Trends and Technology (IJCTT), vol. 29, no. 2, pp. 64–68, 2015. https://doi.org/10.14445/22312803/IJCTT-V29P112.

E. K. Narang, and Sonal, “A study of different attacks in MANET and discussion about solutions of black hole attack on AODV protocol,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 2, no. 4, 2013.

M. Ahmed, A. Abdullah and A. El-Sayed, “A survey of MANET survivability routing techniques,” International Journal of Communications, Network and System Sciences, vol. 6, no. 4, pp. 176-185, 2013. doi: 10.4236/ijcns.2013.64021. https://doi.org/10.4236/ijcns.2013.64021.

R. Thilagarasi, and D. Geetha, “Review on rushing attack and its prevention techniques in MANET,” Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, Int. Jnl. Of Advanced Networking and Applications, March 2015.

S. Ghoreishi, S. A. Razak, I. F. Isnin, and H. Chizari, “Rushing attack against routing protocols in Mobile Ad-Hoc Networks,” Proceedings of the 2014 IEEE International Symposium on Biometrics and Security Technologies (ISBAST), 2014, IEEE, pp. 220–224. https://doi.org/10.1109/ISBAST.2014.7013125.

D. Anitha, and B. V. Priya, “Survey on detecting rushing attack by using routing protocol,” I. J. of Research in Computer Applications and Robotics, vol. 3, no. 9, pp. 70–73, 2015.

S. S. Narayanan, and G. Murugaboopathi, “Prevention of rushing attack in MANET using threshold-based approach,” Int. J. Internet Technology and Secured Transactions, vol. 10, no. 5, pp. 576–584, 2020. https://doi.org/10.1504/IJITST.2020.109536.

C. Suthar, and B. Panchal, “Rushing attack prevention with modified AODV in Mobile Ad hoc Network,” International Journal of Engineering Development and Research, vol. 2, no. 4, pp. 3489–3493, 2014.

D. Shankari, S. Sudhalakshmi, and V.P. Saranya, “Random route selection rushing route algorithm for MANET,” IJARIIE, vol. 3, no. 4, pp. 423–430, 2017.

W. Junaid, and A. Iqbal, “Prevention of multiple rushing attacks in Mobile Ad Hoc Network using AODV routing protocol,” Sci.Int. (Lahore), vol. 30, no. 1, pp. 173–177, 2018.

S. Shrivastava, and D. Mangal, “A new technique to prevent MANET against rushing attack,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3460–3464, 2014.

S. Joshi, and D.K. Mishra, “Detection of rushing attack and data modification attack in Mobile Ad Hoc Networks,” Journal of Critical Reviews, vol. 7, no. 19, pp. 9486–9498, 2020.

S. Shrivastava, and D. Mangal, “A new technique to prevent MANET against rushing attack,” International Journal of Computer Science and Information Technologies, vol. 5, no. 3, pp. 3460–3464, 2014.

K. Gangadhara Rao, Ch. Suresh Babu, B. Basaveswara Rao, and D. Venkatesulu, “Simulation based performance evaluation of various routing protocols in MANETs”, Journal of Mobile Computing & Application, vol. 3, no. 4, pp. 23-39, 2016. https://doi.org/10.9790/0050-03042339.

N. Nissar, N. Naja and A. Jamali, “A neighbor signal strength based coverage for reducing routing overhead in Mobile Ad hoc Networks,” Proceedings of the 2016 5th International Conference on Multimedia Computing and Systems (ICMCS), Marrakech, Morocco, 2016, pp. 321-326. https://doi.org/10.1109/ICMCS.2016.7905527.

A.A. Salem, and H. Awwad, “Mobile ad-hoc network simulators, a survey and comparisons,” International Journal of P2P Network Trends and Technology, vol. 4, no. 3, 2014.

M. H. Kabir, S. Islam, Md. J. Hossain, and S. Hossai, “Detail comparison of network simulators,” International Journal of Scientific & Engineering Research, vol. 5, no. 10, 2014.

K. Fall, and K. Varadhan, “The ns Manual,” The VINT Project - A collaboration between researchers at UC Berkeley, LBL, USC/ISI, and Xerox PARC, February 2011. [Online]. Available at https://www.isi.edu/nsnam/ns/doc/ns_doc.pdf.

T. Issariyakul, and E. Hossain, “An introduction to network simulator NS2,” Springer, Berlin, 2012. https://doi.org/10.1007/978-1-4614-1406-3.

M. H. Rehmani, S. Doria, and M. R. Senouci “Tutorial on the Implementation of Ad-hoc OnDemand Distance Vector (AODV) Protocol in Network Simulator (NS-2)”, NS-2, June 2009.

C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,” No. RFC 3561, pp. 1–37, 2003. https://doi.org/10.17487/rfc3561.

Downloads

Published

2026-03-31

How to Cite

Asres, T. M., Zimbele, G. A., & Kifle, T. M. (2026). Early Rushing Attack Detection and Prevention in AODV MANETs. International Journal of Computing, 25(1), 164-177. Retrieved from https://www.computingonline.net/computing/article/view/4501

Issue

Section

Articles