Research Article

FAPRP: A Machine Learning Approach to Flooding Attacks Prevention Routing Protocol in Mobile Ad Hoc Networks

Table 1

Summary of drawbacks of related works for detecting flooding attacks.

RefNameYearMethodDrawback

[15]Proposed-AODV2004Fixed thresholdIt uses static threshold value which is not suitable for high mobility environment.
Malicious node can pass the security mechanism by transmitting RREQ packets at a frequency lower than the threshold.
[13]FAP2005
[16]EFS2006

[18]B-AODV2016 Dynamic thresholdIt can drop valid request packets of the node moving with high mobility speed if the number of request packets is greater than BI value.
Malicious node can pass the security mechanism by transmitting RREQ packets at a frequency lower than the threshold.

[19]F-IDS2017 Dynamic thresholdPerformance varies. Using new control packets (ALERT) will increase communication overhead and limit the performance when operating in network environment without attacks.
Malicious node can pass the security mechanism by transmitting RREQ packets at a frequency lower than the threshold.

[20]SMA2AODV2017 Dynamic thresholdMalicious node can pass the security mechanism by transmitting the RREQ packets at a frequency lower than the threshold.

[21]SVMT2013SVMThe proposed algorithm uses fixed threshold to detect malicious nodes.

[22]kNN-AODV2014kNNThe algorithm for building training data sets was not presented or justified.