Title: Investigating the effects of security attacks on the performance of TCP variants and routing protocols in MANET

Authors: Henock M. Melaku; Dereje H. Woldegebreal; Kumudha Raimond

Addresses: Electrical and Computer Engineering Department, Addis Ababa University, Addis Ababa Institute of Technology, King George IV St., P.O. Box 385, Addis Ababa, Ethiopia ' Electrical and Computer Engineering Department, Addis Ababa University, Addis Ababa Institute of Technology, King George IV St., P.O. Box 385, Addis Ababa, Ethiopia ' Department of Computer Science and Engineering, Karunya University, Coimbatore, Tamil Nadu 641114, India

Abstract: In mobile ad hoc networks (MANET), security attack due to malicious nodes can affect normal operation of routing protocols, performance of transmission control protocol (TCP), and the network at large. This paper has investigated the effects of packet drop attack on the performance of TCP variants and routing protocols. Simulation was conducted by adding different percentage of malicious nodes in the network. Results have shown that from TCP variants, Vegas outperformed Newreno and SACK with 0% malicious nodes. However, as the percentage of malicious nodes added in the network increases from 5% to 50%, Newreno and SACK performed better than Vegas. Moreover, ad hoc on-demand (AODV) is more robust to packet drop attack than dynamic source routing (DSR). Finally, we have proposed TCP-PLDR (Packet Loss Detection and Response technique), which differentiate packet loss due to congestion or malicious packet drop attack. Experimental results have shown that TCP-PLDR performed better than TCP-SACK.

Keywords: MANETs; mobile ad hoc networks; TCP-PLDR; TCP-SACK; Vegas; Newreno; malicious nodes; packet drop attacks; AODV; ad hoc on-demand; DSR; dynamic source routing; network security; TCP variants; transmission control protocol; routing protocols; simulation; packet loss detection; packet loss response.

DOI: 10.1504/IJCAT.2015.069338

International Journal of Computer Applications in Technology, 2015 Vol.51 No.3, pp.235 - 246

Published online: 13 May 2015 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article