Int
ern
at
i
onal
Journ
al of Ele
ctrical
an
d
Co
mput
er
En
gin
eeri
ng
(IJ
E
C
E)
Vo
l.
10
,
No.
5
,
Octo
be
r
2020
,
pp.
4844
~
4852
IS
S
N:
20
88
-
8708
,
DOI: 10
.11
591/
ijece
.
v
10
i
5
.
pp
4844
-
48
52
4844
Journ
al h
om
e
page
:
http:
//
ij
ece.i
aesc
or
e.c
om/i
nd
ex
.ph
p/IJ
ECE
The
r
esistanc
e of
r
outing
p
ro
t
ocols
a
gainst
DDOS
a
tt
ac
k in
MANE
T
Maha A
bdelh
aq
1
, R
aed Als
aqour
2
, M
ada
Alas
k
ar
3
,
F
ayz
a
Alotaibi
4
, Raw
an
Almu
t
laq
5
,
Bushra
A
l
gha
mdi
6
, Bay
an
Alha
m
ma
d
7
,
Ma
l
ak
Seh
aib
an
i
8
,
Donia
Moyna
9
1
,3,4,5,6,7,8,
9
Depa
rt
m
ent
of
Inform
a
ti
on
Te
chno
log
y,
Col
le
ge
of
Com
pute
r
and
Infor
m
at
ion
Sci
ences,
Prince
ss
Nourah
bint Abdulra
hm
an
Univer
si
t
y
,
Saudi
Arab
ia
2
Depa
rtment of I
nform
at
ion
T
ec
h
nolog
y
,
Co
ll
eg
e of
Com
puti
ng
an
d
Inform
at
ic
s
,
Saudi
E
le
c
tronic
Univer
sit
y
,
Sau
di
Arabi
a
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Dec
18
, 201
9
Re
vised
Ma
r
2
2
,
2020
Accepte
d
Ma
r
30
, 202
0
A
Mobil
Ad
ho
c
Network
(MA
NET)
is
a
wir
eless
m
ult
i
-
hop
n
et
work
with
var
ious
m
obil
e
,
self
-
orga
n
ized
and
wire
le
ss
inf
rastr
uct
ur
e
nod
e
s.
MA
NET
cha
ra
cteri
sti
cs
such
as
op
enne
s
s
restr
icted
res
ourc
es
and
de
c
ent
ra
li
z
at
ion
impact
node
ef
fic
i
ency
and
m
ade
th
em
ea
s
y
to
be
aff
ecte
d
b
y
v
ari
ous
sec
urity
atta
cks,
espe
c
ia
l
l
y
Dist
ribut
ed
Denial
of
Service
(DD
oS)
at
t
ac
ks.
The
goal
of
thi
s
rese
arc
h
is
to
i
m
ple
m
ent
a
simul
at
ion
m
odel
c
al
l
ed
DD
oS
Atta
ck
Sim
ulati
on
Model
(DD
oSM
)
in
Network
Sim
ula
tor
2(N
S
-
2)
and
to
exa
m
ine
the
eff
ec
t
of
DD
oS
A
tt
a
ck
on
var
iou
s
routi
ng
protocol
t
y
p
es
in
MA
NET
namely
:
Zone
Routi
ng
Protocol
(Z
RP
),
Ad
hoc
On
-
Dem
and
Distanc
e
Vec
to
r
(AO
DV
)
protoc
ol
and
Lo
cat
ion
-
Aided
Rou
t
ing
(LAR)
protoc
ol
.
The
in
troduc
ed
m
odel
uses
the
NS
-
2
si
m
ula
tor
to
apply
DD
oS
on
the
thr
ee
chose
n
routi
ng
pro
tocols.
In
t
erms
of
throughput
and
end
-
to
-
end
la
t
ency
under
t
he
conse
quen
ces
of
the
at
t
ac
k
,
the
per
form
an
ce
of
three
routi
ngs prot
o
co
ls wa
s a
n
aly
z
ed.
Ke
yw
or
d
s
:
AOD
V
DD
oS
at
ta
ck
MANET
Rou
ti
ng
Si
m
ulati
on
m
od
el
Copyright
©
202
0
Instit
ut
e
o
f
Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed
.
Corres
pond
in
g
Aut
h
or
:
Ma
ha Abdel
ha
q,
Dep
a
rtm
ent o
f Info
rm
at
ion
Te
chnolo
gy
,
Coll
ege
of
C
om
pu
te
r
an
d
I
nf
or
m
at
ion
Scien
ces
,
Pr
inces
s No
ur
a
h bint
Abd
ulra
hm
an
Un
i
ver
si
ty
, 8
44
28 Ri
ya
dh, S
a
udi A
ra
bi
a
Em
a
il
:
MSAb
de
lhaq
@pn
u.
e
du.sa
, m
aha.uk
m
@g
m
ail.co
m
1.
INTROD
U
CTION
The
Mo
bile
A
d
-
hoc
Net
work
(MA
NET
)
is
a
series
of
m
ob
il
e
nodes
t
hat
are
distri
bu
te
d
via
wirele
s
s
m
ul
ti
-
hop
te
ch
no
l
og
y
[1]
.
Ea
ch
node
ca
n
ac
t
as
a
r
ou
te
r
on
it
s
own
in
a
n
in
fr
ast
ru
ct
ure
-
f
ree
way
t
o
pro
vid
e
the
netw
ork
f
unct
ion
al
it
y
nec
essary
[2,
3]
.
The
MA
NET
can
be
us
e
d
in
var
io
us
fiel
ds,
inclu
ding
m
i
li
ta
ry
app
li
cat
io
ns
,
s
ens
or
e
nv
i
ron
m
ents,
resc
ue
op
e
rati
ons
[
4]
.
MANE
T
ha
s
sp
eci
al
featu
r
es
su
c
h
as
dy
nam
i
c
topolo
gy,
w
hic
h
i
m
plies
that
nodes
f
re
qu
e
nt
ly
chan
ge
m
ob
il
it
y,
wh
ic
h
c
om
pr
om
ise
s
network
sec
ur
it
y
[5]
.
It
is,
therefo
re
vu
l
ner
a
ble
to
var
io
us
at
ta
cks
su
c
h
as
fl
oodi
ng
at
ta
cks
that
deliberatel
y
send
am
ple
traff
ic
pack
et
s
to
i
nter
rupt the
ef
fici
ency o
f
t
he netwo
rk
[
6, 7]
.
Secu
rin
g
MA
NET
is
a
c
riti
cal
researc
h
iss
ue;
it
is
vu
l
nerable
to
m
any
t
ypes
of
at
ta
cks
and
inter
fer
e
s
with
netw
ork
secur
it
y
char
a
ct
erist
ic
s.
On
e
of
the
th
reate
ning
at
ta
cks
MANET
is
th
e
Distribu
te
d
Den
ia
l
of
Ser
vice
(
DDo
S)
at
ta
ck
[7
-
12]
.
Th
e
D
D
oS
at
ta
cker
has
hundre
ds
or
t
housa
nds
of
use
le
ss
pac
kets
f
loodin
g
the
victi
m
'
s
r
eso
ur
ces
t
o
m
ake
the
netw
ork
busy
or
out
of
ser
vice.
T
his
will
re
du
ce
t
he
ca
pa
ci
ty
of
the
netw
ork
a
nd
rende
r
it
unable
to
pe
rfo
rm
it
s
ro
le
.
It
thu
s
beco
m
es
inc
apa
ble
of
pro
vid
in
g
se
rvi
ces
to
the legit
im
a
te
n
odes
.
We
de
plo
ye
d
a
DD
oS
net
work
at
ta
ck
i
n
the
NS
-
2
si
m
ulator
in
this
stud
y,
an
d
it
is
cal
le
d
the
distrib
uted
De
nial
of
Ser
vice
protoc
ol
(
DDoSM
).
D
D
OS
M
us
es
the
NS
-
2
tra
ff
ic
gen
e
rato
r
t
o
pro
duce
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Th
e r
esi
sta
nce
of r
ou
ti
ng
protoco
ls
ag
ain
st
DDO
S att
ack i
n
MAN
E
T
(
Ma
ha A
bd
el
haq)
4845
a
strea
m
of
Con
sta
nt
Bi
t
Ra
te
(CBR
)
traff
ic
,
a
featur
e
that
do
e
s
no
t
exist
in
act
ual
netw
orks
but
is
us
ed
for
si
m
ulati
on
pur
po
s
es
of
te
sti
ng
the
m
os
t
sensiti
ve
a
nd
e
ff
ic
ie
nt
routin
g
protoc
ols
unde
r
the
at
ta
ck
ef
fect
without
af
fecti
ng
netw
ork
pe
rfor
m
ance.
Th
e
DDoSM
m
od
el
will
be
inc
orp
or
at
ed
i
nto
three
ty
pes
of
routi
ng
protoc
ols:
Z
one
Rou
ti
ng
Pro
tocol
(ZRP)
[
13
]
wh
ic
h
is
a
hybri
d
r
ou
ti
ng
prot
oc
ol,
Ad
-
hoc
O
n
-
D
e
m
and
Dista
nce
Vect
or
(
A
ODV)
[
14]
wh
ic
h
is
a
r
eact
ive
routing
pr
ot
oc
ol,
an
d
Locati
on
-
Aide
d
Rou
ti
ng
(
LA
R)
[15]
wh
ic
h
is
an
ai
ded
r
ou
ti
ng
protoc
ol
to
geog
raphic
posit
io
n.
The
D
DoSM
m
od
el
per
f
or
m
s
flo
od
i
ng
at
ta
cks
on
these
r
ou
ti
ng
prot
oco
ls
a
nd
t
he
n
analy
zes
re
sist
ance
to
D
D
oS
at
ta
ck
by
each
of
these
routing
prot
oco
ls
an
d
this can
b
e
u
se
fu
l
for
m
ai
ntain
in
g
a M
A
NE
T.
The
rem
ai
nd
er
of
the
arti
cl
e
is
struct
ur
e
d
accor
dingly
.
We
pro
vid
e
a
n
ov
e
r
view
of
the
resear
c
h
backg
rou
nd
an
d
w
ork
relat
ed
to
it
in
Sec
ti
on
2.
Sect
io
n
3
intr
oduces
the
theor
et
ic
a
l
si
m
ulatio
n
m
od
el
,
si
m
ulati
on
envi
ronm
ent
and
perform
ance
m
et
ric
fo
r
the
DDoS
at
ta
ck
.
Sect
ion
4
ad
dresses
the
res
ults
an
d
evaluati
ons a
nd
we
s
umm
ariz
e
our
r
esea
rch
and
fu
t
ur
e
w
ork
in
Secti
on
5.
2.
BACKG
ROU
ND AN
D REL
ATED W
O
RK
2.1.
Mobil
e
ad
-
h
oc
ne
twor
k
(
MANET
)
MANET
is
a
t
ype
of
wireles
s
net
work
that
does
not
ha
ve
a
cent
ral
ba
s
e
sta
ti
on
t
o
s
pread
no
des.
As
sho
wn
i
n
F
igure
1,
When
two
no
des
ha
ve
to
com
m
un
ic
at
e
with
each
ot
her
,
t
hey
ha
ve
to
be
withi
n
each
oth
e
r'
s
range
a
nd
ha
ve
to r
el
y
on o
the
r
node
s
f
or
com
m
un
ic
at
ion
.
MA
NE
T
is
easi
ly
set
u
p
in
l
ocati
ons
that do
no
t em
br
ace t
he
ex
ist
ence
of
wire
d
net
works for
a s
hort ti
m
e sp
an.
It m
a
y be h
el
pf
ul in wa
r or
natu
ral
disaste
r
sit
uations
.
Howev
e
r,
du
e
to
t
he
la
ck
of
net
works
an
d
cabl
es,
MAN
ET
ha
s
sever
al
ad
va
nt
ageous
be
ne
fits
su
ch
as
low
budget
and
e
ffor
tl
ess
op
e
rati
on,
a
nd
becau
se
it
has
a
qu
ic
k
i
m
plem
entat
ion
with
set
up
f
or
the
sam
e
pur
po
se
. Beca
us
e
of it
s ope
n natu
re,
a
nd
no
central s
up
e
r
vision, MA
NET
su
f
fer
s
fro
m
secur
it
y t
hr
e
at
s.
Figure
1.
Mo
bile
a
d
-
h
oc
n
et
w
ork
2.2.
Routin
g i
n MAN
ET
Rou
ti
ng
is
w
he
n
each
no
de
ha
s
to
fin
d
path
s
to
tran
sfe
r
da
ta
pack
et
s
between
c
om
pu
ti
ng
de
vices
i
n
the
netw
ork.
Rou
ti
ng
in
M
AN
E
T
is
a
m
ajor
chall
en
ge
becau
se
the
t
opology
is
te
m
po
rar
y
and
dynam
ic
.
This secti
on
re
views
our stu
dy
into
the
th
ree
chose
n
r
outi
ng
protoc
ols.
2.2.1.
L
ocation
-
aide
d r
ou
ti
ng
(LA
R) p
r
otoc
ol
LAR
is
on
e
of
the
com
m
on
r
outi
ng
protoc
ols
wh
ic
h
seeks
to
reduce
the
over
he
ad
co
ntr
ol
m
essage
[
15,
16
]
.
I
n
order
to
ide
ntify
a
po
te
ntial
ta
rg
et
node
locat
io
n,
LAR
util
iz
es
the
Global
P
os
i
ti
on
in
g
Syst
e
m
(G
PS
).
LAR
determ
ines
a
portion
of
the
net
wor
k
w
hich
is
ex
per
ie
ncin
g
li
m
i
te
d
f
loodin
g
on
the
basis
of
that
knowle
dg
e
.
S
o,
the
a
m
ou
nt
of
c
on
t
r
ol
m
essages
passing
t
hroug
h
the
net
work
dec
li
nes
durin
g
th
e
rout
e
disco
ver
y proc
ess.
LAR
ass
um
es
that
the
network
n
odes know
their o
w
n
locat
ion
a
nd
th
e
la
st
kn
own
l
oc
at
ion
of
the
de
sti
nati
on
node.
On
th
is
basis,
LAR
li
nk
s
the
sea
rch
area
of
the
r
oute
to
the
reg
i
on
in
w
hich
the
route
to the dest
inati
on no
de
is l
oca
te
d.
LAR
ad
justs
th
e
m
echan
ism
of
pat
h
disc
ov
e
r
y
so
that
only
the
no
des
that
a
re
pa
rt
of
the
s
earch
a
rea
will
retran
sm
it
route
re
quest
pack
et
s
.
Wh
e
n
the
r
ou
te
requ
est
pack
et
reac
hes
the
i
nterm
ediat
e
node
,
th
e
node
first
dete
rm
ine
s
w
hether
t
he
r
equ
e
st
pac
ket
f
or
t
he
inc
om
in
g
r
oute
fall
s
in
to
the
sea
rch
z
on
e
sp
eci
fie
d.
If
not
,
the
r
ou
te
data
pack
a
ge
s
houl
d
be
tra
ns
m
it
t
ed,
un
le
ss
it
is
par
t
of
t
he
s
earc
h
a
rea.
If
no
t,
t
he
pac
ke
t
will
be disca
r
ded.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
5
,
Oct
ob
e
r
2020
:
48
44
-
48
52
4846
As
the
Fig
ur
e
2
s
hows,
i
f
no
des
I
an
d
K
r
ec
ei
ve
a
r
oute
re
qu
e
st
for
destinat
ion
no
de
D
from
no
de
S
,
the
r
ou
te
re
que
st
is
sent
beca
us
e
bot
h
I
a
nd
K
are
within
re
ct
angular
re
qu
est
range.
T
he
path
request
w
il
l
be
sent.
By
com
par
iso
n,
if
t
he
r
ou
te
request
is
receive
d
by
t
he
no
de
N
,
th
e
request
is
ig
nore
d
beca
us
e
N
is
ou
tsi
de
the
r
ect
angular
rou
te
r
equ
e
st zo
ne.
Figure
2.
LAR
routin
g protoc
ol
[
15]
2.2.2.
Ad
-
ho
c
on
-
dem
and d
istan
ce
v
ec
t
or
(AOD
V)
p
r
otoco
l
This
w
ork
a
dopts
the
A
O
DV
routin
g
prot
oco
l
[
17,
18]
.
A
ODV
is
a
powerf
ul,
sel
f
-
sta
rtin
g,
la
rg
e
-
scal
e
r
outi
ng
prot
oco
l.
Ov
e
r
m
any
ye
ars
it
has
be
en
e
xtensive
ly
stud
ie
d
an
d
de
velo
ped,
th
ere
by
confirm
ing
it
s
rob
us
tnes
s
an
d
a
dv
a
ntage
s.
As
s
how
n
in
Figure
3(
a
),
A
ODV'
s
route
di
scov
e
ry
pro
ce
ss
was
accom
pan
ie
d
by
the
source
node
t
ran
sm
it
s
a
route
re
quest
(RREQ
)
pac
ke
t
to
al
l
MAN
ET
node
s.T
he
RR
EQ
pack
et
co
ntain
s
inform
at
ion
on
r
outi
ng,
inc
lud
in
g
the
IP
address
of
the
or
iginat
or,
ID
of
transm
issi
on
an
d
seq
uen
ce
num
ber
of
t
he
recipient.
Eve
ry
in
te
rm
ediat
e
no
de
receive
s
the
RR
EQ
pack
et
and
reta
in
s
the
re
vers
e
path
t
ow
a
rds
t
he
s
ource
node
.
The
interm
ediat
e
node
ver
ifi
es
that
an
RR
EQ
pack
et
with
the
sam
e
IP
ad
dr
es
s
and
tra
ns
m
it
ted
I
D
has
al
rea
dy
been
pro
vid
ed
,
an
d
the
n
decides
wh
et
he
r
an
RR
EQ
pa
cket
is
to
be
refuse
d
or adm
it
te
d.
This
ver
i
ficat
ion
process
hel
ps
preve
nt
at
ta
cks
from
floo
ds.
The
inter
m
ediat
e
no
de
will
validat
e
the
destinat
i
on
se
qu
e
nce
num
ber
co
ntained
i
n
it
s
r
outi
ng
li
st
after
pr
ocessin
g
the
RR
EQ
pack
et
.
The
i
nterm
ediat
e
node
uni
-
c
ast
s
the
R
ou
te
Re
sponse
(R
REP)
pac
ket
to
the
s
ource
node
i
f
the
se
qu
e
nc
e
nu
m
ber
is
gr
e
at
er
than
or
e
qual
to
the
one
fou
nd
in
the
RR
EQ
pac
ket.
If
t
her
e
is
no
fr
es
h
-
sty
le
d
r
ou
te
t
o
the
destinat
io
n
no
de,
the
RR
EQ
pac
ket
m
us
t
retai
n
it
s
Nav
igati
on
un
ti
l
the
ta
r
get
node
is
r
eached
,
wh
ic
h
act
ually
un
i
-
cast
s the
RR
EP p
ac
ket t
o t
he
s
ource
node
as s
how
n
in
Figure
3(b
).
(a)
(b)
Figure
3. A
ODV
r
outi
ng
protoco
l.
S: s
ource
nod
e
, D: de
sti
nation n
ode,
N
1
to
N5 i
nterm
ediat
e node
s
,
(a)
RR
E
Q pac
ket pr
op
a
gatio
n,
(
b)
Path
of t
he
RR
EP
p
ac
ke
t
[19]
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Th
e r
esi
sta
nce
of r
ou
ti
ng
protoco
ls
ag
ain
st
DDO
S att
ack i
n
MAN
E
T
(
Ma
ha A
bd
el
haq)
4847
2.2.3.
Z
on
e
ro
ut
ing
pr
otoc
ol
(Z
RP)
ZRP
is
a
hybr
i
d
r
ou
ti
ng
pr
otoc
ol.
The
m
ai
n
idea
of
this
hybr
i
d
proto
col
is
to
us
e
both
t
he
proacti
ve
and
reacti
ve
protoc
ol
r
ou
ti
ng
m
echan
ism
s
[20]
.
ZRP
is
bas
ed
on
the
z
one
con
ce
pt.
A
zo
ne
'
s
no
des
a
re
bro
ke
n
dow
n
int
o
out
er
no
des
a
nd
inn
e
r
nodes
.
O
uter
nodes
a
re
co
nn
ect
e
d
nodes
directl
y,
a
nd
the
in
ne
r
node
s
are
connecte
d n
od
es ind
ire
ct
ly
. Th
e r
outi
ng
z
on
e is represe
nted
in
hops
with
a rad
i
us
ρ.
If
ρ
=1
im
plies, the sour
ce
on
ly
go
e
s to
it
s d
irect
li
nk
node
s.
I
f
ρ=
2
the
s
ource c
ould
go
fur
the
r.
Since
m
os
t
com
m
un
ic
at
ion
ta
kes
place
in
ZRP
betwee
n
the
nodes
ne
ar
to
each
oth
e
r
,
ZRP
us
es
proacti
ve
prot
oco
ls
t
o
disco
ver
t
he
r
outi
ng
in
form
at
ion
within
t
he
z
on
e
.
T
his
is
known
as
the
IA
RP
(Intra
-
Zo
ne
R
outi
ng
Protoc
ol)
.
The
reacti
ve
protoc
ols
are
use
d
to
disco
ver
the
routes
be
tween
z
o
nes.
T
his
is
nam
ed
IERP
(Interz
on
e
Ro
uting Pr
ot
oco
l)
[
21]
.
Con
si
der
t
he
netw
ork
fou
nd
in
Fig
ure
4(a
).
T
he
S
no
de
has
a
pac
ket
that
m
us
t
be
sent
to
X.
The
scal
e
of
t
he
zo
ne
is
=
2
ra
diu
s
.
T
he
node
us
es
I
A
RP'
s
ro
utin
g
t
able
to
che
ck
if
the
destin
at
ion
li
es
within its zo
ne
. A
route re
que
st i
s g
ive
n
us
i
ng I
ER
P b
eca
use
it
is n
ot ide
ntifie
d.
T
he
m
essage is tra
ns
m
i
tted
to
the
outwar
d
nodes
(th
e
fig
ur
e
sh
ows
a
gr
ay
c
olor).
Eac
h
c
he
ck
-
i
n
their
r
outi
ng
ta
ble
f
or
t
he
destinat
ion.
Node
I
ca
nnot
fi
nd
the
destinat
io
n
in
it
s
r
ou
ti
ng
t
able.
It,
the
refor
e
,
broad
ca
sts
the
m
essage
to
it
s
outw
ar
d
node
s
,
as
show
n
in
Figure
4(b)
i
n
gr
ay
color.
T
he
request
is
not
passe
d
bac
k
t
o
the
node
s
D
,
F
an
d
S
beca
use
of
qu
e
ry c
on
tr
ol
m
echan
ism
s.
Last
ly
,
node
T
receives
a
r
equ
e
st
to
loca
te
the
destinat
ion
in
it
s
r
ou
t
ing
z
on
e
,
as
il
lustrate
d
in
Figure
4(
c
).
N
od
e
T
a
dd
s
t
he
path
from
node
X
it
sel
f
t
o
the
r
oute
re
qu
e
st.
A
r
oute
re
pl
y
with
the
re
ve
rsed
direct
io
n
is
ge
ner
at
e
d
an
d
returne
d
to
t
he
source
node
.
If
there
we
r
e
m
any
route
s
to
the
destinat
ion,
sever
al
re
plies
would be
pr
ov
i
ded to t
he
s
our
ce.
(a)
(b)
(c)
Figure
4
.
ZRP
routin
g protoc
ol
,
(a)
r
ou
ti
ng
zon
e
of
node
S
, (b) r
outi
ng zone
of no
de
I
,
(c)
r
ou
ti
ng z
on
e of
node
T
[
13]
2.3.
Rela
ted w
ork
To
our
best
knowle
dge,
no
on
e
ha
s
c
ondu
ct
ed
a
c
om
par
at
ive
stu
dy
of
the
th
ree
routing
pr
oto
c
ols
chosen
up
to
now:
AOD
V,
Z
RP,
an
d
L
AR
unde
r
the
DDo
S
at
ta
ck
[
10
]
.
In
[22]
,
the
a
ut
hors
ha
ve
e
xa
m
ined
the
perform
a
nce
analy
sis
of
fou
r
A
ODV
r
ou
ti
ng
pr
ot
oco
ls
,
dynam
ic
so
urce
ro
utin
g
(
DS
R)
,
destinat
io
n
-
se
quence
d
dista
nc
e
-
vect
or
r
outi
ng
(
DSDV
),
and
the
opti
m
iz
ed
li
nk
sta
te
ro
utin
g
pr
oto
c
ol
(O
L
SR).
T
he
n
they
con
cl
ud
ed
the
i
m
plem
entat
ion
of
these
protoc
ol
s
under
gr
ey
hole
at
ta
cks
[23]
and
black
ho
le
at
ta
cks
[24, 2
5]
w
ould
suffe
r
a
n
e
f
fici
ency de
gra
dation com
pared to
no
rm
al
si
tuati
on
s
.
In
[
26]
,
the
author
presente
d
a
per
f
or
m
ance
evaluati
o
n
sur
vey
for
the
rou
ti
ng
protoc
ols
AOD
V
and
tem
po
rar
y
ord
ered
r
ou
ti
ng
a
lgorit
hm
(TOR
A)
f
or
va
rio
us
perf
or
m
anc
e
pa
ram
et
ers
unde
r
DDoS
at
ta
ck.
The
sim
ulati
on
had
only
bee
n
i
m
ple
m
ented
f
or
11
no
des.
T
he
res
ults
of
th
is
exp
e
rim
ent
sh
owe
d
that
A
ODV
perform
s b
et
te
r
than
T
ORA.
In
[2]
,
the
a
uthors
i
ns
pecte
d
the
num
ber
of
m
al
ic
iou
s
node
s
increases
wi
th
var
i
ous
reac
ti
ve
routin
g
protoc
ols
duri
ng
the
flo
od
at
ta
ck;
the
ov
e
ral
l
network
pe
rfor
m
ance
decr
e
a
ses.
D
ur
in
g
th
ei
r
work,
the
auth
ors
discusse
d
m
any
per
f
or
m
ance
m
et
rics
su
ch
as
the
rati
o
of
pack
et
tra
nsm
issi
on
,
j
it
te
r,
an
d
thr
oughput
.
The res
ult was
that A
ODV pe
rfor
m
s b
est
under flo
od att
ac
k.
In
[
27]
,
the
auth
or
s
e
valuat
ed
the
perf
orm
ance
of
A
O
DV
a
nd
sec
ure
ad
-
hoc
on
-
dem
and
vecto
r
routin
g
(
SAO
DV)
unde
r
bla
ckhole,
grey
ho
le
,
sel
fish
a
nd
flo
od
i
ng
r
ou
ti
ng
protoc
ols
[
28,
29]
.
Th
ey
pe
rceive
that
the
SAO
DV,
w
hich
is
an
A
O
DV
e
xtension
de
sig
ne
d
to
ac
hieve
t
he
secu
rity
featur
es
in
t
he
r
ou
ti
ng
m
essages,
it
has
bette
r
pe
rfor
m
ance
under
blac
khole,
gr
ey
hole
an
d
sel
fish
at
ta
cks.
I
n
com
par
iso
n,
unde
r
the
flo
odin
g
at
ta
ck,
th
e
AODV
ha
s
su
pe
rio
r
eff
ic
ie
ncy.
The
aut
hor
al
so
fou
nd
th
at
the
netwo
r
k'
s
eff
ect
of f
lo
odin
g
a
nd
black
ho
le
at
ta
cks
is
great
er
than
t
hat of
othe
r
at
ta
cks.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
5
,
Oct
ob
e
r
2020
:
48
44
-
48
52
4848
In
[30]
,
the
a
uth
or
in
vestigat
e
d
the
ef
fect
of
the
Re
source
Con
s
um
ption
Atta
ck
(RCA
)
on
M
ANET
perform
ance,
par
ti
cula
rly
the
AOD
V
prot
oc
ol.
T
his
co
nc
entrated
on
ho
w
the
nu
m
ber
of
at
ta
cke
rs
a
nd
their
locat
ion
would
influ
e
nce
the
pack
et
deliver
y
rati
o
and
j
it
te
r
delay
.
T
he
r
esults
of
t
he
stud
y
m
ay
help
othe
r
researc
hers
pro
po
s
e s
olu
ti
ons
that co
uld
re
duce the im
pact of RC
A.
3.
DDOS
ATTA
CK SIM
UL
A
TION
MO
DE
L (DDO
SM)
Figure
5
dem
on
st
rates
the
arch
it
ect
ure
of
DDoSM
,
the
la
yout
is
ext
end
e
d
t
o
the
t
hr
ee
r
ou
ti
ng
protoc
ols
of
c
hoic
e,
nam
el
y
Z
RP,
A
ODV,
a
nd
LAR.
Whe
n
a
re
gula
r
li
nk
be
gins
us
i
ng
CB
R
traff
ic
,
i
t
sends
ou
t
a
stream
of
flo
odin
g
pac
kets
to
overl
oa
d
the
de
sti
nation.
The
st
ud
y
si
m
ulati
on
s
we
re
co
ns
tr
ucted
us
in
g
NS
-
2
to
e
valua
te
the
eff
ect
ive
ness
of
the
D
DoS
at
ta
ck,
an
d
the
sim
ulatio
n
fin
dings
we
r
e
colle
ct
ed
fro
m
two
exp
e
rim
ental
s
cenari
os
.
The
f
irst
scena
rio
a
s
show
n
i
n
F
i
gure
6
was
ap
pl
ie
d
by
var
yi
ng
one
fact
or
w
hi
ch
is
the
num
ber
of
at
ta
cker
s
(3,
6
and
9),
al
l
at
ta
cker
s
ha
ve
a
ra
dio
ra
ng
e
of
250
m
.
and
the
at
ta
cker
s
wer
e
placed
near
t
he
destin
at
ion
wh
e
re
th
ey
cou
l
d
ex
ha
ust
their
li
m
it
ed
receive
d
wind
ow
w
hich
i
n
th
e
w
or
st
case
le
ads
to
resou
rce c
on
s
um
pt
ion
wh
ic
h helps
to clari
fy the e
ff
ect
of f
l
ooding at
ta
c
k.
Figure
5. D
D
oSM
s
yst
em
a
rc
hitec
ture
Figure
6. Net
w
ork
t
opology f
or scena
rio
I
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Th
e r
esi
sta
nce
of r
ou
ti
ng
protoco
ls
ag
ain
st
DDO
S att
ack i
n
MAN
E
T
(
Ma
ha A
bd
el
haq)
4849
The
sec
ond
sc
enar
i
o
as
s
ho
wn
in
F
ig
ur
e
7
ca
rr
ie
s
out
the
r
esults
by
va
ryi
ng
the
rad
i
o
ra
nge
(30
0,
350
a
nd
400
m
),
wh
erea
s
t
he
nu
m
ber
of
at
ta
cker
s
is
3.
Us
in
g
a
tra
ff
ic
loa
d
of
2
pac
kets
/s,
the
CB
R
connecti
on star
ts fr
om
2
s
un
til the si
m
ula
ti
on
ends.
The
at
ta
cker
s tar
get the CBR
co
nn
ect
ion
in
bo
th cas
es b
y
us
in
g
a
flood
rate
equ
al
to
50
pac
kets
/s
and
the
siz
e
of
the
pac
kets
is
1000
byte
s
an
d
the
at
ta
cker
beg
i
ns
si
m
ulati
on
unti
l t
he
en
d
at
30 s.
T
he param
eter
s
of the sim
ulati
on
used
in
a
ll
scenar
io
s are
shown i
n
Ta
bl
e 1
.
Figure
7. Net
w
ork
t
opology f
or scena
rio
II
Table
1
. Si
m
ul
at
ion
par
am
et
e
rs
Para
m
eter
Valu
e
Netwo
rk ar
ea
1
0
0
0
m
x 1
0
0
0
m
No
.
o
f
no
d
es
50
No
d
e sp
eed
0
–
7
m
/s
Ban
d
wid
th
1
1
m
b
p
s
Tr
af
f
ic Packet size
5
1
2
bytes
Pack
et r
at
e
2
pack
ets p
er
seco
n
d
Tr
af
f
ic ty
p
e
CBR
Flo
o
d
in
terval
0
.02
s
Flo
o
d
r
ate
5
0
pack
ets p
er
sec
o
n
d
Mob
ility
m
o
d
el
Ran
d
o
m
w
ay
p
o
in
t
An
ten
n
a
m
o
d
el
O
m
n
id
irection
al
Prop
ag
atio
n
m
o
d
el
Two
-
ra
y
gro
u
n
d
Period
of
e
m
u
l
atio
n
1
0
0
s
The
resea
rc
h
f
ocused
on
eac
h
r
ou
ti
ng
prot
oco
l;
unde
r
th
e
DDoS
at
ta
ck
,
two
pe
rfo
rm
ance
m
et
rics
wer
e
calc
ulate
d.
a.
Thro
ughput
Thro
ughput
is
the
num
ber
of
bits
per
unit
of
tim
e
at
the
de
sti
nation.
I
n
ea
ch
ex
pe
rim
ent
al
ou
tc
om
e,
this re
pr
ese
nts
the s
um
o
f
the
destinat
io
ns
t
hroug
hput
values
.
b.
En
d
-
to
-
e
nd d
el
ay
It
is
the
tim
e
between
th
e
firs
t
bit
of
a
packe
t
being
sent
by
the
source
an
d
the
e
nd
bit
of
the
pack
e
t
bein
g
se
nt
by the
destinat
io
n si
de.
In each
e
xp
e
rim
ent, the a
ver
a
ge
ti
m
e is
r
ec
orded f
or the
destinat
io
n
4.
RESU
LT
S
AND DI
SCUS
S
ION
S
4.1.
E
xp
eri
m
ent
al results
for
th
e
sce
na
ri
o
I
Floodin
g
CB
R
traf
fic
af
fects
MANET
,
wh
e
r
e
over
w
helm
e
d
tra
ff
ic
is
sent
to
the
de
sti
nation,
create
s
congesti
on
in
the
us
ual
route
resu
lt
in
g
in
the
data
pa
cket
fall
ing
as
a
resu
lt
,
aff
ect
in
g
the
ne
twork
perform
ance
m
et
rics.
T
he
e
xperim
ental
resu
lt
s
in
Fi
gure
8
dem
on
strat
e
th
at
the
netw
ork
thr
oughput
dec
li
nes
wh
e
n
t
her
e
is
a
n
inc
rease
d
nu
m
ber
of
at
ta
ck
ers.
I
f
put near
the
de
sti
nation,
D
DoSM wil
l
create
this dif
f
eren
ce
unde
r
3,
6,
a
nd
9
at
ta
cker
s
.
ZRP
decr
ea
s
es
netw
ork
th
rou
ghput
by
a
rou
nd
42.
1
pe
rcen
t
c
om
par
ed
t
o
the
norm
al
situ
at
ion
(z
er
o
at
ta
cker
s
)
wh
e
n
3
at
ta
cker
s
are
add
e
d.
I
n
the
case
of
LAR,
it
red
uce
s
network
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
5
,
Oct
ob
e
r
2020
:
48
44
-
48
52
4850
thr
oughput
by
51.5
pe
rcen
t.
AOD
V'
s
eff
ic
ie
ncy
is
po
or
e
r
than
oth
e
r
protoco
ls
beca
us
e
it
el
i
m
inate
s
networ
k
com
m
un
ic
at
ion
by
57.
4%.
Z
RP
r
e
du
ce
s
network
th
rou
ghput
by
a
r
ound
49.
1
per
ce
nt
c
om
par
ed
to
t
he
norm
a
l
scenari
o
(ze
r
o
at
ta
cker
s)
i
n
th
e
case
of
6
at
ta
cker
s
ap
plied.
In
t
he
case
of
LAR,
it
re
duce
s
netw
ork
t
hro
ughput
by
56.
3
per
ce
nt
.
AOD
V'
s
perform
ance
is
lower
t
han
ot
her
protoc
ols
bec
aus
e
it
re
du
c
es
netw
ork
t
hroughp
ut
by
61.
7%.
I
n
the
w
orst
case
of
this
e
xp
e
r
i
m
ent,
as
i
m
ple
m
ented
by
9
at
ta
cker
s,
ZR
P
re
du
ce
s
network
thr
oughput
by
about
57.1
pe
rcen
t
com
par
e
d
to
the
norm
al
(zero
at
ta
ck
ers)
sit
uatio
n.
In
the
case
of
LAR,
it
red
uces
net
work
t
hro
ughp
ut
by
62.
8
perce
nt.
A
O
DV
'
s
eff
ic
ie
ncy
is
poorer
t
han
othe
r
prot
oco
ls
be
cause
it
el
i
m
inate
s
network
c
omm
un
ic
at
ion
by
67.
3%.
As
note
d
in
Fig
ur
e
8,
the
i
m
pact
of
the
at
ta
ck
is
di
rectl
y
pro
portion
al
to
the
nu
m
ber
of
at
ta
cker
s,
as
a
resu
lt
,
it
is
ass
um
ed
that
if
the
nu
m
ber
of
at
ta
cker
s
re
aches
m
or
e
than
10,
the
ne
twork
c
ould
crash
beca
us
e
of
th
e
num
ber
of
at
ta
cke
rs
i
s
3,
the
pe
rform
ance
in
LA
R
and
AOD
V
dro
ppe
d
to
half
the
norm
al
scenario
for
each
proto
col
an
d
the
pe
rfo
rm
ance
of
9
at
ta
cker
s
co
nt
inu
es
to
de
c
rease.
Fi
gure
9
s
hows
the
ef
fects
of
the
at
ta
ck
on
t
he
e
nd
-
to
-
en
d
delay
com
par
e
d
to
the
num
ber
of
at
ta
cker
s,
AODV
has
the
la
rg
est
ef
fect
com
par
ed
to
ot
her
protoc
ols
wh
e
re,
in
the
case
of
9
at
ta
ckers
,
the
delay
incre
ases
by
arou
nd
98
.
71%
an
d
in
the
case
o
f
LAR
an
d
ZRP
,
the
delay
increases
by
97.
1%
and
96% r
e
sp
ect
ive
ly
, r
esulti
ng i
n ZR
P outpe
rfo
r
m
ing
o
t
her p
rot
oco
ls i
n
te
rm
s o
f
end
-
to
-
e
nd
delay
.
Figure
8. Th
r
ough
pu
t
vs n
umber
of att
acke
r
s
Figure
9. Dela
y vs n
um
ber
of
att
ackers
4.2.
E
xp
eri
m
ent
al results
for sce
na
ri
o
II
The
sim
ulati
on
res
ults
of
sc
enar
i
o
I
I
de
m
on
st
rate
the
e
f
fect
of
va
ryi
ng
the
at
ta
cke
r'
s
rad
i
o
ra
nge
unde
r
the
pe
rfor
m
ance
m
et
ri
cs
(thro
ughput
and
e
nd
-
to
-
en
d
delay
),
t
he
r
adio
ra
nge
sp
e
ci
fies
the
m
ax
i
m
u
m
distance
a
node
can
se
nd
it
s
data.
I
nc
reasin
g
the
rad
i
o
ra
nge
le
ads
t
o
de
c
reasin
g
the
net
work
thr
ough
put
an
d
increasin
g
the
en
d
-
to
-
e
nd
de
la
y.
In
sce
na
rio
II,
the
nu
m
ber
of
at
ta
cker
s
i
s
3
a
nd
the
flo
od
i
ng
rate
is
50
pac
kets/s.
The
fo
c
us
wa
s
on
var
yi
ng
t
he
ra
dio
ra
ng
e
an
d
ob
se
r
vin
g
it
s
i
m
pact
on
the
t
hr
ee
r
ou
ti
ng
protoc
ols,
it
ca
n
be
seen
f
ro
m
the
F
ig
ure
10,
ZRP
sho
ws
a
sli
gh
t
dec
rease
in
net
wor
k
th
r
oughput
w
hile
LAR
sh
ows
a
n
ave
r
age
dro
ppin
g
in
thr
ough
pu
t,
howe
ver,
A
O
DV
s
hows
the
worst
perform
ance
unde
r
al
l
ranges.
Figure
11
dep
i
ct
s
the
ef
fect
of
dif
fer
e
nt
ra
dio
ra
ng
e
on
t
he
e
nd
-
to
-
en
d
delay
,
A
O
DV
has
t
he
highes
t
delay
c
om
p
a
r
e
d
t
o
o
t
h
e
r
t
w
o
p
r
o
t
o
c
o
l
s
i
n
a
l
l
r
a
n
g
e
s
,
i
n
c
o
n
t
r
a
s
t
,
Z
R
P
h
a
s
t
h
e
m
i
ni
m
um
d
e
l
a
y
a
nd
b
e
t
t
e
r
p
e
r
f
o
r
m
a
n
c
e
.
Figure
10. T
hr
oughput
vs
r
ad
io r
a
nge
Figure
11. Del
ay
v
s
r
adi
o ran
ge
Evaluation Warning : The document was created with Spire.PDF for Python.
In
t J
Elec
&
C
om
p
En
g
IS
S
N:
20
88
-
8708
Th
e r
esi
sta
nce
of r
ou
ti
ng
protoco
ls
ag
ain
st
DDO
S att
ack i
n
MAN
E
T
(
Ma
ha A
bd
el
haq)
4851
5.
CONCL
US
I
O
N
AND
F
UT
U
RE W
ORK
This
re
searc
h
analy
zed
th
ree
ty
pes
of
r
outi
ng
prot
oco
ls
i
n
MA
NET
a
nd
im
ple
m
ented
a
D
DoSM
us
in
g
CB
R
traff
ic
flo
od
i
ng.
DD
oS
has
be
en
de
plo
ye
d
us
in
g
the
NS2
e
m
ulator
in
t
he
routin
g
pro
tocols
AOD
V,
ZRP
and
LAR
.
A
ddit
ion
al
ly
,
the
eff
ic
ie
ncy
of
r
ou
ti
ng
protoc
ol
s
was
a
naly
zed
us
in
g
perfor
m
ance
par
am
et
ers
of
the
th
r
oughput
an
d
e
nd
-
to
-
en
d
delay
.
F
inall
y,
the
as
sessm
ent
and
analy
sis
e
f
fe
ct
s
of
the
proto
cols
wer
e
pr
ese
nte
d.
I
n
bo
t
h
sce
nar
i
os
,
ZRP
w
orke
d
best
in
t
erm
s
of
thr
oughput
an
d
en
d
-
to
-
e
nd
delay
and
e
xhibit
ed
the
m
os
t
resist
ance
beh
a
vior
relat
ive
to
the
protoc
ols
AOD
V
an
d
L
AR.
F
or
fu
t
ur
e
work,
we'
ll
evaluate
the
perform
ance
of
th
ese
protoco
ls
on
oth
e
r
perform
ance
m
et
rics,
incl
ud
i
ng
j
it
te
r
an
d
ove
rh
ea
d
routin
g.
We a
r
e now l
ooki
ng
to do
a
r
eal
ist
ic
d
e
plo
ym
ent.
ACKN
OWLE
DGE
MENTS
This
re
searc
h
was
fun
ded
by
the
Dea
ns
hi
p
of
Scie
ntific
Re
searc
h
at
P
rincess
N
ourah
bi
nt
Abd
ulra
hm
an
Un
i
ver
sit
y t
hro
ugh
t
he
Fa
st
-
tr
ack Resea
rch F
unding
Pro
gr
a
m
.
REFERE
NCE
S
[1]
R.
Raj
u
L.
and
C.
R.
K.
Redd
y
,
“
Node
ac
ti
vity
base
d
trust
and
rep
utation
esti
m
a
ti
on
appr
oa
ch
for
s
ec
ure
and
QoS
routi
ng
in
MA
NET,
”
In
te
rnati
onal
Journal
of
El
ectric
al
&
Computer
Enginee
ring
(
IJE
CE
)
,
vol.
9,
no.
6,
pp.
5340
-
5350
,
2019.
[2]
P.
Kakka
r
and
K.
Saluj
a
,
“
Perform
anc
e
inve
st
iga
ti
ons
of
r
ea
c
ti
ve
rout
ing
pro
toc
ols
under
f
lo
oding
at
t
ac
k
in
MA
NET,
”
in
20
16
3rd
Inte
rnati
onal
Confe
ren
ce
on
Computing
f
or
Sustainabl
e
Global
Dev
e
lop
me
nt
(
INDIACom)
,
pp.
623
-
627
,
20
16.
[3]
S.
G.
Dat
e
y
an
d
T.
Ans
ari
,
“
Mobile
Ad
-
hoc
net
works
it
s
ad
vant
ag
es
and
ch
al
l
enge
s,
”
Int
ernati
onal
Journal
of
El
e
ct
rica
l
and
E
le
c
tronic
s R
ese
a
rch
,
vol
.
3
,
no
.
2
,
pp
.
491
-
496
,
2
015.
[4]
M.
Yada
v
and
N.
Uparosi
y
a,
“
Survey
on
M
AN
ET
:
Routi
ng
protoc
ols,
adv
ant
ag
es,
probl
e
m
s
and
sec
urity
,
”
Inte
rnational
Jo
urnal
of
Inno
vat
i
ve
Comput
er
Sc
i
enc
e
&
Engi
nee
ring
,
vo
l. 1,
no.
2,
pp.
12
-
17,
2014
.
[5]
P.
Na
y
ak
and
B
.
Vatha
sava
i,
“
Im
pac
t
of
ran
dom
m
obil
ity
m
od
el
s
for
rea
ctiv
e
routi
ng
protoc
ol
s
o
ver
MANET
,
”
Inte
rnational
Jo
urnal
of
S
imulat
i
on
--
Syste
ms
,
S
cienc
e
&
Technol
ogy
,
vo
l. 17, pp.
13.
1
-
13.
9
,
2016
.
[6]
S.
Gurung
and
S.
Chauha
n,
“
A
d
y
namic
thr
esh
old
base
d
al
gor
i
thm
for
improvi
ng
sec
urity
and
per
form
anc
e
of
AO
DV
un
der
bl
ac
k
-
hol
e at
t
ac
k
i
n
MA
NET,
”
Wir
el
ess Networ
ks
,
vol.
25
,
pp
.
1685
-
1695,
2019
.
[7]
S.
Sarika,
e
t
a
l.
,
“
Secur
ity
issues
in
m
obil
e
ad
h
oc
net
works
,
”
P
roce
dia
Comput
er
Scienc
e
,
vo
l.
92,
pp.
329
-
335
,
2016.
[8]
O.
H.
Younis,
e
t
al.
,
“
A
Surve
y
on
Secur
i
t
y
Att
ac
ks/Defe
nses
i
n
Mobile
Ad
-
ho
c
Networks,
”
C
omm
un
ic
ati
on
o
n
Appl
ied
E
lectron
ics
,
vo
l. 6,
no.
1
0,
pp
.
1
-
9
,
2017
.
[9]
L.
Sergi
i,
e
t
a
l.
,
“
Dete
ct
ion
of th
e
botne
ts’
low
-
r
a
te
DD
oS a
tt
a
cks
base
d
on
self
-
si
m
il
ari
t
y
,
”
Int
ernati
onal
Journal of
El
e
ct
rica
l
&
Co
mputer
Engi
n
ee
r
ing
,
vo
l. 10, pp.
3651
-
3658,
202
0.
[10]
A.
Sara
vana
n
,
e
t
al
.
,
“
A
new
fr
amework
to
al
l
evi
a
te
DD
oS
vu
ln
era
b
il
i
ti
es
in
cl
oud
computin
g,
”
Inte
rnat
iona
l
Journal
of
Elec
t
rical
&
Compute
r E
ngineering
,
v
ol.
9
,
no
.
5
,
pp
.
4
163
-
4175,
2019
.
[11]
M.
Nare
nder
an
d
B.
N.
Yuvara
ju,
“
Pree
m
pti
ve
m
odel
li
ng
towar
ds
cl
assif
y
ing
vu
lne
rab
il
i
t
y
of
D
DoS
at
ta
ck
in
SD
N
envi
ronm
ent
,
”
I
nte
rnational
Jou
rnal
of El
e
ct
ri
ca
l
&
Co
mputer
E
ngine
ering
,
vol
.
10,
no
.
2
,
pp
.
15
99
-
1611,
2020
.
[12]
A.
D.
Bashee
r
,
e
t
al.
,
“
SIEM
-
base
d
detec
t
ion
and
m
it
iga
t
ion
of
Io
T
-
b
otnet
DD
oS
at
t
ac
ks,
”
Inte
rna
ti
onal
Journal
of
El
e
ct
rica
l
&
Co
mputer
Engi
n
ee
r
ing
,
vo
l. 10, pp.
2182
-
2191,
202
0.
[13]
N.
Bei
j
ar,
“
Zon
e
routi
n
g
pro
tocol
(ZRP),
”
Ne
t
working
La
bora
tor
y
,
Helsink
i
Univer
sit
y
of
Te
c
hnolog
y
,
Finl
an
d
,
pp.
1
-
12
,
2002
.
[14]
C. Perkins
, E
.
Be
lding
-
Roye
r
, and S.
Das, "
Ad hoc
on
-
de
m
and
distance
vecto
r
(
A
ODV
)
r
outi
ng," 2
070
-
1721, 2
003.
[15]
Y.
B.
Ko
and
N.
H.
Vaid
y
a
,
“
Loc
a
ti
on
‐
Aid
ed
Routi
ng
(LAR)
in
m
obil
e
ad
hoc
net
works
,
”
Wi
rele
ss
net
works
,
vol.
6
,
pp
.
307
-
3
21,
2000
.
[16]
M.
F.
Khan
and
I.
Das,
“
An
I
nve
stiga
ti
on
on
Exis
ti
ng
Protocol
s
i
n
MA
NET,
”
in
I
nnovat
ions
in
C
omputer
Scienc
e
and
Engi
n
ee
ring
,
pp
.
215
-
224
,
2
019
.
[17]
C.
E.
Per
kin
s
,
E.
Be
ldin
g
-
Ro
ye
r,
a
nd
S.
Da
s,
"A
d
hoc
On
-
Dem
and
Dista
nce
Vecto
r
(
A
ODV)
Ro
utin
g,"
IETF
MANET
In
te
r
net Draft
,
2003.
[18]
C.
E
.
Perk
ins
an
d
E.
M.
Ro
y
er
,
“
Ad
-
hoc
on
-
demand
dista
n
ce
v
ector
routi
ng
,
”
in
Proce
ed
ings
of
t
he
Sec
ond
IEEE
Workshop on
M
obil
e
Computer
Syste
ms
and
App
li
cations
(
WMCSA'99
)
,
New Orl
ea
ns, LA,
pp.
90
-
100
,
1999
.
[19]
M.
Abdelha
q
,
e
t
al
.
,
“
Secur
ing
m
obil
e
ad
ho
c
n
et
works
using
d
ange
r
th
eor
y
-
bas
ed
artifi
ci
a
l
im
m
une
al
gorit
hm
,
”
PLoS
ONE
,
vo
l.
10
,
no
.
5
,
p
.
e01
20715
,
2015
.
[20]
S.
R.
Ma
lwe,
et
al
.
,
“
Locat
ion
an
d
select
iv
e
-
bord
erc
ast
base
d
enh
anc
ement
of
zon
e
routi
ng
proto
c
ol,
”
in
2016
3rd
Inte
rnational
Co
nfe
renc
e
on
Rec
ent
Adv
anc
es
in
Information
Tec
hnology
(
RA
IT)
,
pp.
83
-
88
,
2016
.
[21]
A.
Kum
ar,
et
al
.
,
“
Loc
a
ti
on
-
bas
ed
routi
ng
proto
col
s
for
wire
le
ss
sensor
net
works
:
A
surve
y
,
”
Wirel
ess
Sensor
Net
work
,
vol
.
9
,
no.
1
,
pp
.
25
-
72
,
2017.
[22]
M.
S.
Khan
,
e
t
al
.
,
“
A
compara
ti
ve
p
erf
orm
ance
an
aly
sis
of
M
AN
ET
routi
ng
pr
otoc
ols
und
er
sec
urity
attac
ks
,
”
in
Mobi
le
and
W
irel
ess Tec
hno
lo
gy
,
pp
.
137
-
145
,
2015
.
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2088
-
8708
In
t J
Elec
&
C
om
p
En
g,
V
ol.
10
, No
.
5
,
Oct
ob
e
r
2020
:
48
44
-
48
52
4852
[23]
S.
Gurung
and
S.
Chauha
n
,
“
A
novel
appr
oa
ch
for
m
it
ig
a
ti
ng
gra
y
hol
e
a
tt
a
ck
in
MA
NET,
”
Wirel
ess
Net
wor
ks
,
vol.
24
,
pp
.
565
-
579,
2018
.
[24]
S.
Praka
sh
and
A.
Sw
aro
op,
“
A
brie
f
surve
y
of
b
la
ckho
le
detec
t
i
on
and
avoi
da
nc
e
for
ZRP
protoc
ol
in
MA
NETs,
”
in
2016
In
te
rnati
onal
Conf
ere
nce on
Computing
,
Comm
unic
ati
on
and
Aut
omat
ion (
ICCCA
)
,
pp.
65
1
-
654
,
2016
.
[25]
L.
A.
K.
Al
Dula
imi
,
et
a
l.,
“
Bla
c
k
hole
at
ta
ck
b
e
havi
ora
l
anal
y
s
is
gene
ra
l
net
work
sca
la
bi
li
t
y
,
”
Ind
onesian
Journal
of
E
le
c
tric
al
En
gine
ering
and
C
omputer
Scienc
e
,
vol
.
13
,
no
.
2
,
p
p.
677
-
682
,
201
9.
[26]
S.
Garg,
“
Perfor
m
anc
e
an
aly
sis of
AO
DV
and
TO
RA
under
DDoS
at
tack
in
MA
NETs,
”
I
JSR
Int
ernati
onal
J
o
urnal
of
Sc
i
ence
and
R
es
earc
h
,
vol. 3,
no.
10
,
pp
.
297
-
304,
2014
.
[27]
M.
A.
Abdelsh
af
y
and
P.
J.
B.
King,
“
AO
DV
and
SA
O
DV
under
at
t
a
ck:
Perform
ance
compari
son,
”
in
Inte
rnational
Co
nfe
renc
e
on
Ad
-
Hoc
Net
works a
nd
Wireless
,
pp.
318
-
331
,
2014
.
[28]
M.
M.
Ghonge,
et
a
l.
,
“
Selfi
sh
a
t
ta
ck
d
etec
t
ion
in
m
obil
e
Ad
hoc
net
works
,
”
in
20
17
Inte
rnationa
l
Confe
renc
e
on
Innov
ati
ons
in
I
nformation,
Embe
dded
and
Com
municat
ion
System
s (
ICIIE
CS
)
,
pp.
1
-
4
,
2017
.
[29]
K.
A.
P.
Yam
ini
,
et
al.
,
“
Handli
ng
Selfi
shn
ess
over
Coll
abor
a
tive
Mec
h
an
ism
i
n
a
Mobi
le
Ad
hoc
Network
,
”
Journal
of
Cyb
e
r Se
curity
and
M
obil
ity
,
vol
.
7
,
n
o.
1&2
,
pp
.
39
-
5
2,
2018
.
[30]
M.
Abdelha
q
,
e
t
al.
,
“
The
Im
pac
t
of
R
esourc
e
Consum
pti
on
Atta
ck
on
Mob
il
e
Ad
-
hoc
Ne
t
work
Routi
ng,
”
I
nte
rnational
J
o
urnal
of
N
et
wor
k
Se
curit
y
,
vo
l. 1
6,
pp
.
no
.
4
,
pp
.
3
99
-
404
,
2014
.
Evaluation Warning : The document was created with Spire.PDF for Python.