Ha T. T. Truong, Huy D. Le, Huy-Trung Nguyen, Ngoc T. Luong
{"title":"使用中值和固定阈值对抗泛洪攻击的路由协议","authors":"Ha T. T. Truong, Huy D. Le, Huy-Trung Nguyen, Ngoc T. Luong","doi":"10.12720/jcm.19.6.298-307","DOIUrl":null,"url":null,"abstract":"—The limitation of the Ad Hoc On-Demand Distance Vector (AODV) protocol is that the Route Request Packet (RREQ) is not designed for security purposes. Therefore, a malicious node can attack the network by continuously broadcasting RREQ packets at high frequency, which is called the RREQ packet flooding attack. The result is a broadcast storm that greatly increases media waste and resource waste. This article proposes a Flooding Attack Detection Mechanism Using the Median (FDMM) value to detect and prevent flooding attacks. Each node that installs the FDMM solution will collect the route discovery behavior history (V) of each node to construct the route discovery frequency vector; By calculating the median value (m) of V, the node compares the m value with a Fixed Threshold (FT) node that can identify a node that has performed malicious or normal behavior. The paper also proposes the Flooding Attacks Prevention and Detection Routing Protocol (FDMM AODV) protocol by improving the route discovery mechanism of the AODV protocol using FDMM. Simulation results show that our solution can detect over 98% of malicious nodes; Packet delivery ratio, routing load, and end-to-end delay are effectively improved.","PeriodicalId":53518,"journal":{"name":"Journal of Communications","volume":"59 7","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Routing Protocol against Flooding Attack Using Median Value and Fixed Threshold\",\"authors\":\"Ha T. T. Truong, Huy D. Le, Huy-Trung Nguyen, Ngoc T. Luong\",\"doi\":\"10.12720/jcm.19.6.298-307\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"—The limitation of the Ad Hoc On-Demand Distance Vector (AODV) protocol is that the Route Request Packet (RREQ) is not designed for security purposes. Therefore, a malicious node can attack the network by continuously broadcasting RREQ packets at high frequency, which is called the RREQ packet flooding attack. The result is a broadcast storm that greatly increases media waste and resource waste. This article proposes a Flooding Attack Detection Mechanism Using the Median (FDMM) value to detect and prevent flooding attacks. Each node that installs the FDMM solution will collect the route discovery behavior history (V) of each node to construct the route discovery frequency vector; By calculating the median value (m) of V, the node compares the m value with a Fixed Threshold (FT) node that can identify a node that has performed malicious or normal behavior. The paper also proposes the Flooding Attacks Prevention and Detection Routing Protocol (FDMM AODV) protocol by improving the route discovery mechanism of the AODV protocol using FDMM. Simulation results show that our solution can detect over 98% of malicious nodes; Packet delivery ratio, routing load, and end-to-end delay are effectively improved.\",\"PeriodicalId\":53518,\"journal\":{\"name\":\"Journal of Communications\",\"volume\":\"59 7\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Journal of Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12720/jcm.19.6.298-307\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Engineering\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12720/jcm.19.6.298-307","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Engineering","Score":null,"Total":0}
引用次数: 0
摘要
-Ad Hoc On-Demand Distance Vector(AODV)协议的局限性在于路由请求数据包(RREQ)不是为安全目的而设计的。因此,恶意节点可以通过高频率地持续广播 RREQ 数据包来攻击网络,这就是所谓的 RREQ 数据包泛洪攻击。其结果是广播风暴,大大增加了媒体浪费和资源浪费。本文提出了一种使用中值的泛洪攻击检测机制(FDMM)来检测和预防泛洪攻击。安装 FDMM 解决方案的每个节点将收集每个节点的路由发现行为历史记录(V),以构建路由发现频率向量;通过计算 V 的中值(m),节点将 m 值与固定阈值(FT)节点进行比较,从而识别出有恶意或正常行为的节点。本文还通过使用 FDMM 改进 AODV 协议的路由发现机制,提出了洪水攻击预防和检测路由协议(FDMM AODV)。仿真结果表明,我们的解决方案可以检测到 98% 以上的恶意节点;数据包传输率、路由负载和端到端延迟都得到了有效改善。
Routing Protocol against Flooding Attack Using Median Value and Fixed Threshold
—The limitation of the Ad Hoc On-Demand Distance Vector (AODV) protocol is that the Route Request Packet (RREQ) is not designed for security purposes. Therefore, a malicious node can attack the network by continuously broadcasting RREQ packets at high frequency, which is called the RREQ packet flooding attack. The result is a broadcast storm that greatly increases media waste and resource waste. This article proposes a Flooding Attack Detection Mechanism Using the Median (FDMM) value to detect and prevent flooding attacks. Each node that installs the FDMM solution will collect the route discovery behavior history (V) of each node to construct the route discovery frequency vector; By calculating the median value (m) of V, the node compares the m value with a Fixed Threshold (FT) node that can identify a node that has performed malicious or normal behavior. The paper also proposes the Flooding Attacks Prevention and Detection Routing Protocol (FDMM AODV) protocol by improving the route discovery mechanism of the AODV protocol using FDMM. Simulation results show that our solution can detect over 98% of malicious nodes; Packet delivery ratio, routing load, and end-to-end delay are effectively improved.
期刊介绍:
JCM is a scholarly peer-reviewed international scientific journal published monthly, focusing on theories, systems, methods, algorithms and applications in communications. It provide a high profile, leading edge forum for academic researchers, industrial professionals, engineers, consultants, managers, educators and policy makers working in the field to contribute and disseminate innovative new work on communications. All papers will be blind reviewed and accepted papers will be published monthly which is available online (open access) and in printed version.