A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs

Authors

  • Preet R Dept. of Applied Science (Computer Applications), I.K. Gujral Punjab Technical University, Kapurthala, India
  • Rani S Dept. of CSE, Gaini Zail Singh Campus College of Engineering and Technology, Bathinda, India
  • Singh P Dept. of CSE, Gaini Zail Singh Campus College of Engineering and Technology, Bathinda, India

DOI:

https://doi.org/10.26438/ijcse/v6i1.196202

Keywords:

MANETs, Flooding, Learning Automata, AODV, DoS, QoS

Abstract

The inherent characteristics of mobile ad hoc networks make them susceptible to different types of malicious flooding attacks. Data flooding attack is one of them. Such flooding attacks deplete the network bandwidth and other precious resources to a large extent, creating barriers for future communication among legitimate nodes, paralyzing network operations and leading to Denial of Service (DoS) situation. Learning Automata theory has emerged as a useful tool for performing research activities targeting wireless mobile ad hoc networks. In this paper, we present LA-FIDS - a Learning Automata based Flooding Intrusion Detection System that mitigates the effect of data flooding attack in MANETs by detecting and isolating energy draining malicious node from the communication path. The proposed work is an effort to fill the gap mentioned F-IDS scheme, for not mitigating data flooding attack. The proposed mechanism is implemented in NS 2.35 and simulation results show a considerable improvement in network performance as compared to F-IDS scheme in term of various network performance metrics.

References

J. Sun, “Mobile Ad hoc Networking: A Essential Technology for Pervasive Computing”, In the Proceedings of International Conference on Info-tech and Info-net (ICII) Vol, 3 Beijing, pp. 316-321, 2001.

M. S. Alkatheiri, J. Liu, A. R. Sangi, “AODV Routing Protocol Under Several Routing Attacks in MANETs”, In the Proceedings of IEEE 13th International Conference on Communication Technology (ICII), pp. 614-618, 2011.

A. Mishra, R. Jaiswal, S. Sharma “A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network”, In the Proceedings of 3rd IEEE International Conference - Advance Computing Conference (IACC), pp. 499-504 2013.

S. Corson and J. Macker, “Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”, Internet Request for comment RFC 2501, Jan 1999.

R. Ramanathan, J. Redi , “A brief overview of ad hoc networks: challenges and directions”, IEEE Communication Magazine, pp. 20-22, 2002

B. Wu, J. Chen, Wu, J. Wu, and M. Cardei, “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks”, Wireless Network Security, Springer US, pp. 103-135, 2007.

M. O. Pervaiz, M. Cardei and J. Wu, “Routing Security in Ad hoc Wireless Networks”, Department of Computer Science and Engineering, Florida Atlantic University, Boca Raton, FL 33431, pp. 117-142, June 2010.

B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, "A survey of Routing Attacks in Mobile Ad hoc Networks", In the Proceedings of Wireless Communications, IEEE Issue 5, pp. 85-91, 2007.

R. H. Khokhar, M. A. Ngadi, S. Mandala, "A Review of Current Routing Attacks In Mobile Ad Hoc Networks", International Journal of Computer Science and Security (IJCSS), Volume 2, Issue 3, pp. 18-29, 2008.

M. Al-Shurman, S.M. Yoo, and S. Park, "Black Hole Attack in Mobile Ad hoc Networks", In the 42nd Annual Southeast Regional Conference ACM (ACMSE 2004), pp. 96-97, 2004.

Y.C. Hu, A. Perrig, D. B. Johnson, "Wormhole Attacks in Wireless Networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 370-380, 2006.

Y.C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad hoc Network Routing Protocols," In the 2nd ACM Workshop on Wireless Security, pp. 30-40, 2003.

P. Yi, Z. Dai, Y. Zhong, and S. Zhang, "Resisting Flooding Attacks in Ad hoc Networks", International Conference on Information Technology: Coding and Computing 2005 (ITCC 2005), vol. 2, pp. 657-662, 2005.

B. Sharma, “Pragmatic Analysis of Energy Conservation in MANETs”, International Journal of Computer Science and Engineering, Vol- 3 Issue -5, pp. 227-230, 2015.

J. Mirkovic and P. Reiher, “A taxonomy of DDoS Attack and DDoS Defense Mechanisms”, ACM Comput. Commun. Review, 34(2), pp.39–53, 2004.

K. S. Narendra, M. Thathachar, “Learning Automata an Introduction”, Prentice-Hall, New York, 1989.

P. Nicopolitidis, G.I. Papadimitriou, P. Sarigiannidis, M. S. Obaidat and A. S. Pomportsis, “Adaptive Wireless Networks Using learning Automata”, IEEE Wireless Communications, 2014.

S. Misra, P.V. Krishna, A. Bhiwal, A. S. Chawla, B. E. Wolfinger and C. Lee, “A Learning Automata-based Fault-tolerant routing Algorithm for Mobile Ad hoc Networks”, Springer –The Journal of Supercomputing, Volume 62 issue 1, pp. 4-23, 2012.

S. Jagannathan, M. J. Zawodniok, “Dynamic Channel Allocation in Wireless Networks using Adaptive Learning Automata”, International Journal of Wireless Information Networks, Volume 18, Issue 4, pp. 295-308, 2011.

S. Gurung, S. Chauhan, “A Novel Approach for Mitigating Route Request Flooding Attack in MANET”, Wired Networks 2017, pp. 1–16, 2017.

C. E. Perkins, “Ad Hoc On-Demand Distance Vector (AODV) Routing,” INTERNET DRAFT - Mobile Ad hoc NETworking (MONET) Working group of the Internet Engineering Task Force (IETF), 1997.

D. B. Johnson, D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Springer- Mobile Computing, pp. 153-181. Kluwer Academic Publishers, Dordrecht, Netherlands, 1996.

Z. J. Haas and M. R. Pearlman, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks”, INTERNET DRAFT - Mobile Ad hoc NETworking (MONET) Working group of the Internet Engineering Task Force (IETF), 1997.

Y. Ko and N. H. Vaidya, “Location-Aided Routing (LAR) in Mobile Ad Hoc Networks”, Springer –Wireless Networks, pp. 307-321, 2000.

S. Desilva and R. V. Boppana, “Mitigating Malicious Control Packet Floods in Ad hoc networks,” IEEE Wireless Communications and Networking Conference (WCNC) USA, vol. 4, pp. 2112-536, 2005.

S. Li, Q. Liu, H. Chen, and M. Tan, “A New Method to Resist Flooding Attacks in Ad Hoc Networks,” In the Proceedings of IEEE International conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp. 1-4, 2006.

K.A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, "Packet Size based Routing for stable data delivery in Mobile Ad-hoc Networks," IEICE Transactions on Communications, vol. E91-B, no. 7, pp. 2244-2254, 2008.

X. Yang, Y. Shi, M. Zeng, and R. Zhao, "A Novel Method of Network Burst Traffic Real-time prediction based on decomposition," International Conference on Networking (ICN), Lecture Notes in Computer Science, vol. 3420, pp. 784793, 2005.

H. Kim, R. B. Chitti and J. Song, “Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks”, IEEE Transactions on Consumer Electronics , pp. 579-582, 2010.

S. Akram, I. Zubair, M.H. Islam, “Fully Distributed Dynamically Configurable firewall to Resist DOS”, In the Proceedings of IEEE International Conference. on Networked Digital Technologies, pp. 547-549, 2009

M. Bahl, R. Bhoomarker, S. Zafar, “Distributed Detection of packet flooding in Infrastructure-less Wireless Network- An adaptive approach”, In the Proceedings of IEEE International Conference on Advances in Engineering & Technology (ICAETR), pp. 1-4, 2014

Downloads

Published

2025-11-12
CITATION
DOI: 10.26438/ijcse/v6i1.196202
Published: 2025-11-12

How to Cite

[1]
R. Preet, S. Rani, and P. Singh, “A Learning Automata Based Mechanism to Mitigate Energy Draining Data Flooding Attack in MANETs”, Int. J. Comp. Sci. Eng., vol. 6, no. 1, pp. 196–203, Nov. 2025.

Issue

Section

Research Article