You are on page 1of 3

IJSRD - International Journal for Scientific Research & Development| Vol.

4, Issue 03, 2016 | ISSN (online): 2321-0613

Review of Rushing Attack in MANETs


Swapandeepdeep Kaur Chahal1 Dinesh Kumar2
1,2
Department of Computer Science & Engineering
1,2
GZS Campus College of Engineering & Tech. Bathinda, Punjab, India
Abstract Mobile Ad Hoc Network is a collection of attacker present then he will accept the packet and send to
multihop wireless mobile node that communicates with each his neighbour with high transmission speed as compared to
other without centralized control. Each node in MANETs act other nodes, which are present in the wireless network.
as both router as well as host. Security is the most Because of this high transmission speed, packet forwarded
challengeable task in MANETs. MANET is vulnerable to by the attacker will first reach to the destination node.
various kinds of network attacks such as black hole attack, Destination node will accept this packet and discard other
grey hole attack, worm hole attack, rushing attack, Sybil, packets which are reached later on. Receiver originates this
flooding attack, link spoofing, packet dropping attack, route as a suitable route and use for further communication.
location disclosure etc. On-demand routing protocols in ad This way attacker will effectively achieve access in the
hoc networks were not originally designed to deal with communication between sender and receiver.
security threats ,so as to malicious users have been searching
ways to attack networks. Rushing attacks represent one of
such possibilities. In these attacks, malicious nodes forward
the Route Request (RREQ) packets, asking for a route, to the
destination node faster than the legitimate nodes do. This is
possible because the legitimate nodes only forward the first
received RREQ packet for a given route discovery.
Moreover, the attackers can tamper with either the medium
access control or routing protocols to get quicker processing.
As a result, the path through the malicious nodes is chosen,
which renders throughput degradation.
Key words: Mobile Node, Rushing Attack, Intrusion Fig. 1: Rushing attack [4]
Detection Technique, Malicious Node

I. INTRODUCTION
Mobile Ad Hoc Network (MANET) is a compilation of
mobile devices without having any intended infrastructure to
connect mobile devices to wired networks. Since there is no
infrastructure, all important network operations like routing,
forwarding must be handled by the mobile nodes that are
each node act both as a router and as an end host at the same
time. MANETs are very flexible and can be recognized
quickly and easily using low cost equipments. Due to Fig. 2: Network displaying rushing attack [15]
limited radio range of wireless nodes, the path among a pair
of nodes may consists of many mobile nodes. MANETs II. RELATED WORK
have a wide range of applications such as collaborative, In [1], authors have stated the position
distributed mobile computing (e.g., sensors, conferences), of Rushing attacks against routing protocols and the
disaster relief (e.g., flood, earthquake), war front activities functionality of this type of attacks. As of the nature of
and communication between automobiles on highways. wireless channels, MANETs are exposed against many
Most of these applications demand multicast or group threats and attacks. Next to this, the movement of the
communication [3].Mobile ad hoc networks are created network nodes completes the security of routing protocols as
from movable nodes that are dynamic type of network and one of the research areas over Ad-Hoc networks.
communicate information across the network. The various Furthermore, Rushing attack became one of the
security issues in MANETs are lack of secure boundaries, general attacks against routing protocols in MANETs.
risks from compromised nodes inside the network, lack of In [2], authors have proposed an IDS for packet
centralized management facility, restricted Power Supply, dropping nodes in the network based on anomaly detection.
scalability and efficient routing. There are various types of Anomaly means abrupt increase or decrease in the patterns.
attacks such as black hole attack, wormhole attack, In such kind of IDS, the behaviour of the nodes is measured
eavesdropping, location disclosure, flooding attack and in the network continuously. First the nodes are monitored
rushing attack. In rushing attack, which result in denial of when there is no black hole attack or grey hole nodes
services when used against all earlier available on-demand present. In this scenario, all the nodes will normally forward
ad-hoc network routing protocol [2]. Rushing attack exploits the packets that are intended to be delivered at the
this duplicate suppression mechanism by rapidly forwarding destination node. Now, if some malicious nodes enter the
route discovery packet in order to gain access to the network and starts dropping the packets, their behaviour is
forwarding group [1][8]. When a node send a route request analyzed against the past patterns when the communication
packet to another node in the wireless network, if there an was going normally.

All rights reserved by www.ijsrd.com 1952


Review of Rushing Attack in MANETs
(IJSRD/Vol. 4/Issue 03/2016/508)

In [6], authors describe the features, application, as security in MANET setups is very restricted and the
well as vulnerabilities of mobile ad hoc network also possibility of spoofing, replay transmission, header
presents an overview and the study of attacks and their modification, etc. always exists. Link level security, using
mitigation in routing protocols. Each device in a MANET is encryption, does decrease threats, but the most vital issue
free to move without any interference in any direction, remains with inter-router confirmation earlier to the
linking to other devices frequently. Each should forward exchange of network control information. MANET routing
traffic dissimilar to its own use, and therefore be a router. Its protocols have been improved to deal with the security
routing protocol has to be able to handle with the new needs. An attack that is rushing attack prevents discovery of
challenges that a MANET creates such as nodes mobility, routes ahead of two hops by all previously published
security maintenance, and quality of service, limited protocols. Rushing attack prevention is a generic safe route
bandwidth and limited power supply etc. discovery part, which can be applied on any on-demand
In [8], the authors have paid attention to route discovery mechanism against rushing attack. Any
rushing attack which threatens the security of the MANETs MANET node can maliciously disrupt and deny the
by studying this kind of attack and its impact on MANETs. communication of other nodes. Secured message
Rushing attacks in mobile ad hoc networks cause system transmission protocol safeguards data transmission against
resources to become limited and isolates genuine users from any random malicious behavior of network nodes. SMT uses
the network. Consequently, this type of attack drastically secured routing protocol (SRP) in the route discovery phase.
influences network connectivity , weakens networking
functions and capabilities such as control and message III. CONCLUSION
delivery.Research on rushing attack has been examined and In this paper presents MANETs and its security attacks
the number of protocols recognized to get better solution for taxonomy in conjunction with various attacks. It gives a
this attack. The authors have also examined the Secured study of rushing attack and its effect in MANETs. It also
DSR protocol which has been designed to address this describes how formation of rushing attack can be made. In
attack. In addition, the authors have highlighted the this context the effect of rushing attacks over AODV, which
strengths and weaknesses of the secured dynamic source is defined as reactive distance vector protocol is presented in
routing protocol and establish that this is the best solution to this work. Rushing attack is an advance attack. This paper
tackle the rushing attack problem. analyzes the different technique to prevent the rushing
In [10], the authors have provided an alternative of attack or to reduce the harmful effect of rushing attack. But
rushing attack, which targets on the scheduling mechanism the earlier techniques are not adequate to prevent this attack.
of ExOR. ExOR that makes the finest use of every broadcast
and chooses the next hop after the transmission for that hop,
REFERENCES
is an opportunistic routing protocol in Wireless Mesh
Network. As effectively increasing the throughput of the [1] Ghoreishi, S.-M.; Abd Razak, S.; Isnin, I.F.; Chizari,
network, ExOR doesn't take any safety measures into H., "Rushing attack against routing protocols in Mobile
account. As ExOR attempts to schedule the transmission by Ad-Hoc Networks" , International Symposium on
the help of each node, the scheduling mechanism of ExOR Biometrics and Security Technologies (ISBAST), IEEE
is simply damaged by attackers. The attacker breaks the 2014
scheduling mechanism and forwards the portion in spite of [2] Uyyala,S.; Naik,D., "Anomaly based intrusion detection
higher priority nodes' sending, that leads to the incorrect of packet dropping attacks in mobile ad-hoc networks,"
setting of other nodes' forwarding timer. And then authors International Conference on Control, Instrumentation,
have projected the anti-rushing mechanism, a defense Communication and Computational Technologies
against the alternative of rushing attack for ExOR. (ICCICCT), IEEE 2014
In [13], authors have stressed on the security of [3] Gajendra Singh Chandel and Rajul Chowksi, Study of
DSR protocol in order to avoid the rushing attack. Rushing attack in MANET, International journal of
Rushing attack is a malicious attack that is directed against ucterion (IJCA), Vol. 79, No. 10, Oct. 2013.
on demand routing protocols that uses duplicate suppression [4] Satyam Shrivastava, Rushing Attack and its Prevention
at each node. The attacker exploits this property in order to Techniques, International Journal of Application or
prevent communication between the key nodes in the Innovation in Engineering and Management (IJAIM),
network. To attain this, it will try to be a component of the Vol. 2, No. 4, April 2013, ISSN 2319 4847.
route that the source node uses to transmit data to the goal [5] Satyam Shrivastava and Sonali Jain, A brief
node. By capturing the path effectively, the attacker will introduction of different types of security attacks in
disrupt the swapping of packets between the nodes, thus found in Mobile Ad-hoc Networks, International
resulting in denial-of-service. Journal of Computer Science & Engineering
In [14], this paper has analyzed the result Technology (IJCSET), Vol. 4, No. 3, March 2013.
of rushing attack on SMT/SRP and also evaluated the [6] Naveen Hemrajani, Detection and Mitigation
significance of a variety of variants of rushing attack as Techniques of Black Hole Attack in MANET: An
applicable to SMT/SRP. Communication in mobile ad-hoc Overview, International Journal of Science and
networks comprises two phases which are route discovery Research, 2(5), 70 - 73. (2013)
and data transmission. In a hostile environment, adversarial [7] Hyojin Kim, Ruy de Oliveira, Bharat Bhargava and
nodes can try to interrupt communication in both phases; JooSeok Song, A Novel Robust Routing Scheme
therefore, to guarantee complete security, both against Rushing Attacks in Wireless Ad Hoc
communication phases should be protected. Physical

All rights reserved by www.ijsrd.com 1953


Review of Rushing Attack in MANETs
(IJSRD/Vol. 4/Issue 03/2016/508)

Networks. Published online: 12 July 2012 Springer


Science+Business Media, LLC. 2012.
[8] Al Shahrani, "Rushing Attack in Mobile Ad Hoc
Networks", Third International Conference on
Intelligent Networking and Collaborative Systems
(INCoS), IEEE 2011
[9] Asmaa A.; Sharad G., Importance of Intrusion
Detection System (IDS) International Journal of
Scientific & Engineering Research, Vol. 2, Issue 1, Jan.
2011
[10] He Xianzong,; Tan Xiaobin ; Zhou Yu ; Qin Guihong,
"Defense of a variant of rushing attack on ExOR, " 29th
Chinese Control Conference (CCC), IEEE 2010
[11] V. Palanisamy and P.Annadurai, Impact of Rushing
attack on Multicast in Mobile Ad Hoc Network,
International Journal of Computer Science and
Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009.
[12] Animesh P.; Jung-Min P., An overview of anomaly
detection techniques: Existing solutions and latest
technological trends, Elsevier, Science Direct,
Computer Networks, vol. 51, pp. 3448-3470, 2007
[13] TamilSelvan, L., Sankaranarayanan, V., "Solution to
Prevent Rushing Attack in Wireless Mobile Ad hoc
Networks", International Symposium on Ad Hoc and
Ubiquitous Computing, ISAUHC. IEEE 2006.
[14] Rawat, A.; Vyavahare, P.D.; Ramani, A.K., "Evaluation
of rushing attack on secured message transmission
(SMT/SRP) protocol for mobile ad-hoc networks,"
International Conference on Personal Wireless
Communications. ICPWC IEEE 2005.
[15] Yin-Chun Hu, Adrian Perrig and David B. Johnson,
Rushing attack and Defense in Wireless Ad Hoc
Network Routing Protocols, Wise 2003, San Diego,
California, USA.

All rights reserved by www.ijsrd.com 1954