{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T11:32:38Z","timestamp":1722943958423},"reference-count":21,"publisher":"Engineering and Technology Publishing","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["jcm"],"published-print":{"date-parts":[[2021]]},"abstract":"<jats:p>On-demand routing protocol is designed to work efficiently on mobile ad hoc networks (MANET). They operate with the belief that all nodes in the network are friendly, thus hackers exploiting security vulnerabilities to carry out some form of cyber attacks, especially Flooding attacks. This form of attack is easily accomplished by overflowing route request packets into the network. Once the attack frequency is large enough, it shall interfere with the route discovery of other network nodes, damaging network performance. In this article, we will analyze and evaluate the impact of flood attacks on the performance of two routing protocols AOMDV. Thereby, we describe a security solutions using the One Time Password (OTP) authentication mechanism (OAM) and implementing AOMDV-OAM security protocol, which is improved from the AOMDV protocol by using OAM to reduce the harmful effects of flood attacks. Using NS2, we assess the security effectiveness of the AOMDV-OAM protocol in random waypoint network topologies where has flooding attacks. Simulation results show that AOMDV-OAM protocol is very effective in minimizing the harmful effects of flood attacks, the rate of successful packet delivery reached over 99% when the one malicious node attacked with a frequency of 20pkt\/s and 50pkt\/s for Grid network topology.<\/jats:p>","DOI":"10.12720\/jcm.16.3.104-110","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T03:07:37Z","timestamp":1615259257000},"page":"104-110","source":"Crossref","is-referenced-by-count":0,"title":["AOMDV-OAM: A Security Routing Protocol Using OAM on Mobile Ad Hoc Network"],"prefix":"10.12720","author":[{"name":"Faculty of Information Technology","sequence":"first","affiliation":[]},{"given":"Le Duc","family":"Huy","sequence":"first","affiliation":[]},{"name":"Ha noi University of Business and Technology, Viet Nam","sequence":"additional","affiliation":[]},{"given":"Luong Thai","family":"Ngoc","sequence":"additional","affiliation":[]},{"given":"Nguyen Van","family":"Tam","sequence":"additional","affiliation":[]}],"member":"4977","published-online":{"date-parts":[[2021]]},"reference":[{"key":"ref0","unstructured":"[1] H. Jeroen, M. Ingrid, D. Bart, and D. Piet, \"An overview of mobile ad hoc networks: Applications and challenges,\" Journal of the Communications Network, vol. 3, no. 3, pp. 60-66, 2004."},{"key":"ref1","doi-asserted-by":"publisher","unstructured":"[2] M. K. Marina and S. R. Das, \"Ad hoc on-demand multipath distance vector routing,\" Wireless Communications and Mobile Computing, 2006.","DOI":"10.1002\/wcm.432"},{"key":"ref2","doi-asserted-by":"publisher","unstructured":"[3] M. Salehi, A. Boukerche, and A. Darehshoorzadeh, \"Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks,\" Ad Hoc Networks, 2016.","DOI":"10.1016\/j.adhoc.2016.07.004"},{"key":"ref3","unstructured":"[4] X. Gao and W. Chen, \"A novel Gray hole attack detection scheme for mobile ad-hoc networks,\" in Proc. IFIP International Conference on Network and Parallel Computing Workshops, 2007, pp. 209-214."},{"key":"ref4","doi-asserted-by":"publisher","unstructured":"[5] T. T. Vo, N. T. Luong, and D. Hoang, \"MLAMAN: a novel multi-level authentication model and protocol for preventing wormhole attack in mobile ad hoc network,\" Wireless Networks, vol. 25, no. 7, pp. 4115-4132, 2019.","DOI":"10.1007\/s11276-018-1734-z"},{"key":"ref5","doi-asserted-by":"publisher","unstructured":"[6] L. S\u00e1nchez-Casado, G. Maci\u00e1-Fern\u00e1ndez, P. Garc\u00eda-Teodoro, and N. Aschenbruck, \"Identification of contamination zones for Sinkhole detection in MANETs,\" Journal of Network and Computer Applications, vol. 54, pp. 62-77, 2015.","DOI":"10.1016\/j.jnca.2015.04.008"},{"key":"ref6","unstructured":"[7] L. Thai-Ngoc and V. Thanh-Tu, \"Whirlwind: A new method to attack routing protocol in mobile ad hoc network,\" International Journal of Network Security, vol. 19, no. 5, pp. 832-838, 2017."},{"key":"ref7","doi-asserted-by":"publisher","unstructured":"[8] V. Thanh-Tu and L. Thai-Ngoc, \"SMA2AODV: Routing protocol reduces the harm of flooding attacks in mobile ad hoc network,\" Journal of Communications, vol. 12, no. 7, pp. 371-378, 2017.","DOI":"10.12720\/jcm.12.7.371-378"},{"key":"ref8","doi-asserted-by":"publisher","unstructured":"[9] N. T. Luong, T. T. Vo, and D. Hoang, \"FAPRP: A machine learning approach to flooding attacks prevention routing protocol in mobile ad hoc networks,\" Wireless Communications and Mobile Computing, 2019.","DOI":"10.1155\/2019\/6869307"},{"key":"ref9","doi-asserted-by":"publisher","unstructured":"[10] S. Gurung and S. Chauhan, \"A novel approach for mitigating route request flooding attack in MANET,\" Wireless Networks, 2018.","DOI":"10.1007\/s11276-017-1515-0"},{"key":"ref10","unstructured":"[11] P. Yi, Y. Hou, Y. Zhong, S. Zhang, and Z. Dai, \"Flooding attack and defence in ad hoc networks,\" Journal of Systems Engineering and Electronics, 2006."},{"key":"ref11","unstructured":"[12] J. H. Song, F. Hong, and Y. Zhang, \"Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks,\" in Proc. Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, 2006."},{"key":"ref12","doi-asserted-by":"publisher","unstructured":"[13] M. J. Faghihniya, S. M. Hosseini, and M. Tahmasebi, \"Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network,\" Wireless Networks, 2017.","DOI":"10.1007\/s11276-016-1259-2"},{"key":"ref13","doi-asserted-by":"publisher","unstructured":"[14] J. Von Mulert, I. Welch, and W. K. G. Seah, \"Security threats and solutions in MANETs: A case study using AODV and SAODV,\" Journal of Network and Computer Applications, vol. 35, no. 4, pp. 1249-1259, 2012.","DOI":"10.1016\/j.jnca.2012.01.019"},{"key":"ref14","doi-asserted-by":"publisher","unstructured":"[15] Y. Ping, D. Zhoulin, Y. Zhong, and Z. Shiyong, \"Resisting flooding attacks in ad hoc networks,\" in Proc. International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, vol. 2, pp. 657-662, 2005.","DOI":"10.1109\/ITCC.2005.248"},{"key":"ref15","doi-asserted-by":"publisher","unstructured":"[16] F. C. Jiang, C. H. Lin, and H. W. Wu, \"Lifetime elongation of ad hoc networks under flooding attack using power-saving technique,\" Ad Hoc Networks, 2014.","DOI":"10.1016\/j.adhoc.2014.05.002"},{"key":"ref16","doi-asserted-by":"publisher","unstructured":"[17] V. Balakrishnan, V. Varadharajan, U. Tupakula, and M. E. G. Moe, \"Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications,\" in Proc. 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007, 2007.","DOI":"10.1109\/AUSWIRELESS.2007.46"},{"key":"ref17","doi-asserted-by":"publisher","unstructured":"[18] W. Li, P. Yi, Y. Wu, L. Pan, and J. Li, \"A new intrusion detection system based on KNN classification algorithm in wireless sensor network,\" Journal of Electrical and Computer Engineering, 2014.","DOI":"10.1155\/2014\/240217"},{"key":"ref18","doi-asserted-by":"publisher","unstructured":"[19] C. E. Perkins, M. Park, and E. M. Royer, \"Ad-hoc On-Demand Distance Vector Routing,\" in Proc. Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), 1999, pp. 90-100.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref19","unstructured":"[20] DARPA, \"The network simulator NS2,\" 1995."},{"key":"ref20","doi-asserted-by":"publisher","unstructured":"[21] J. Yoon, M. Liu, and B. Noble, \"Random waypoint considered harmful,\" IEEE INFOCOM 2003, vol. 2, pp. 1-11, 2003.","DOI":"10.1109\/INFCOM.2003.1208967"}],"container-title":["Journal of Communications"],"original-title":[],"link":[{"URL":"http:\/\/www.jocm.us\/uploadfile\/2021\/0222\/20210222034841400.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,25]],"date-time":"2021-11-25T00:43:41Z","timestamp":1637801021000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jocm.us\/show-252-1640-1.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":21,"URL":"https:\/\/doi.org\/10.12720\/jcm.16.3.104-110","relation":{},"ISSN":["1796-2021"],"issn-type":[{"type":"print","value":"1796-2021"}],"subject":[],"published":{"date-parts":[[2021]]}}}