Cargando…

MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks

In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routi...

Descripción completa

Detalles Bibliográficos
Autores principales: Del-Valle-Soto, Carolina, Mex-Perera, Carlos, Monroy, Raul, Nolazco-Flores, Juan A.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5539809/
https://www.ncbi.nlm.nih.gov/pubmed/28678180
http://dx.doi.org/10.3390/s17071573
_version_ 1783254551331078144
author Del-Valle-Soto, Carolina
Mex-Perera, Carlos
Monroy, Raul
Nolazco-Flores, Juan A.
author_facet Del-Valle-Soto, Carolina
Mex-Perera, Carlos
Monroy, Raul
Nolazco-Flores, Juan A.
author_sort Del-Valle-Soto, Carolina
collection PubMed
description In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M.
format Online
Article
Text
id pubmed-5539809
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-55398092017-08-11 MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks Del-Valle-Soto, Carolina Mex-Perera, Carlos Monroy, Raul Nolazco-Flores, Juan A. Sensors (Basel) Article In this work, we present the design of a mitigation scheme for jamming attacks integrated to the routing protocols MPH, AODV, and DSR. The resulting protocols are named MPH-M (Multi-Parent Hierarchical - Modified), AODV-M (Ad hoc On Demand Distance Vector - Modified), and DSR-M (Dynamic Source Routing - Modified). For the mitigation algorithm, if the detection algorithm running locally in each node produces a positive result then the node is isolated; second, the routing protocol adapts their paths avoiding the isolated nodes. We evaluated how jamming attacks affect different metrics for all these modified protocols. The metrics we employ to detect jamming attack are number of packet retransmissions, number of CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) retries while waiting for an idle channel and the energy wasted by the node. The metrics to evaluate the performance of the modified routing protocols are the throughput and resilience of the system and the energy used by the nodes. We evaluated all the modified protocols when the attacker position was set near, middle and far of the collector node. The results of our evaluation show that performance for MPH-M is much better than AODV-M and DSR-M. For example, the node energy for MPH-M is 138.13% better than AODV-M and 126.07% better than DSR-M. Moreover, we also find that MPH-M benefits much more of the mitigation scheme than AODV-M and DSR-M. For example, the node energy consumption is 34.61% lower for MPH-M and only 3.92% and 3.42% for AODV-M and DSR-M, respectively. On throughput, the MPH protocol presents a packet reception efficiency at the collector node of 16.4% on to AODV and DSR when there is no mitigation mechanism. Moreover, MPH-M has an efficiency greater than 7.7% with respect to AODV-M and DSR-M when there is a mitigation scheme. In addition, we have that with the mitigation mechanism AODV-M and DSR-M do not present noticeable modification. However, MPH-M improves its efficiency by 8.4%. We also measure the resilience of these algorithms from the average packet re-transmissions perspective, and we find that MPH-M has around a 15% lower change rate than AODV-M and DSR-M. The MPH-M recovery time is 5 s faster than AODV-M and 2 s faster than DSR-M. MDPI 2017-07-05 /pmc/articles/PMC5539809/ /pubmed/28678180 http://dx.doi.org/10.3390/s17071573 Text en © 2017 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Del-Valle-Soto, Carolina
Mex-Perera, Carlos
Monroy, Raul
Nolazco-Flores, Juan A.
MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
title MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
title_full MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
title_fullStr MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
title_full_unstemmed MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
title_short MPH-M, AODV-M and DSR-M Performance Evaluation under Jamming Attacks
title_sort mph-m, aodv-m and dsr-m performance evaluation under jamming attacks
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5539809/
https://www.ncbi.nlm.nih.gov/pubmed/28678180
http://dx.doi.org/10.3390/s17071573
work_keys_str_mv AT delvallesotocarolina mphmaodvmanddsrmperformanceevaluationunderjammingattacks
AT mexpereracarlos mphmaodvmanddsrmperformanceevaluationunderjammingattacks
AT monroyraul mphmaodvmanddsrmperformanceevaluationunderjammingattacks
AT nolazcofloresjuana mphmaodvmanddsrmperformanceevaluationunderjammingattacks