Static and Dynamic Routing
Protocols in Network Security
Attacks
INDEX
1. Introduction
2. Algorithms in Routing
3. UAV Routing Protocols
4. The Major Attacks on Network
5. Conclusion
6. References
2
1. Introduction
Networking is exchanging and transporting data between the nodes by the
medium of informative data. Networking provides multiple uses in different fields
or organizations as well as individual users. By the study by Zhang, C. et al. [1],
Monitoring and controlling the plethora of network components has become
impossible due to the rising diversity and complexity of mobile network topologies.
Every organization needs network security to protect its data or
information from the cyber-threats. By Dalal, S. et al. [2], Security in networks is
basically a set of configurations and rules to protect the accessibility and integrity
of networks. It is applied in different fields such as firewall protection, network
access control, cloud security, virtual private networks, and secure web gateway.
3
Fig. 1. Static and dynamic routing
Above in Figure 1, there is shown D1 and D2 are devices, and in static routing R1
and R2 are routers and they use routing that is configured manually to travel by
the network. On the other hand, in dynamic routing R1, R2, R3, and R4 are routers
that use algorithms to determine efficient paths to travel by the network.
4
Several routing protocols were developed that increase the efficiency of the
networks. According to the study by Muzammal, S. M. et al. [3], To secure
communication in network systems, one needs to make sure that it is entirely
secure. A routing protocol for the IoT is called Routing Protocol for Low-Power and
Lossy Networks (RPL). RPL protocol is also used to detect RPL inside attacks using
algorithms.
Fig. 2. The number of increasing network devices and hackers
5
By looking at Figure 2, It is clearly visible that the number of hackers is increasing
every year due to an increase in the statistics of network devices. By network
devices, Hackers can always make use of network equipment for their own gain
and launch phishing attacks.
2. Algorithms in Routing
Reactive Routing: The reactive routing protocol does not need to keep track of
the routing information for every node; instead, it simply generates routes
whenever one of the sources needs to talk. According to research by Yang, H. et al.
[4], FANET routing has an extremely hard architecture.
Proactive Routing: Proactive routing requires each node to have a routing table
with information on how to go from one node to another. Such routers are not
appropriate for FANETs because the rapid mobility of nodes in FANETs frequently
alters the topology of the network.
6
Hybrid Routing: Both reactive and proactive routing is used by the hybrid routing
method. It employs rules to distinguish between domains' reactive and inactive
routing and separates networks into domains.
DSR protocol: It is a reactive routing protocol that extracts information on
topology from the source router.
Route Maintenance: It is used to make the routing table exist in source nodes.
Throughout the transmission procedure data, the router which is developed must
be continually upheld.
Route Discovery: It determines if the node has a target and data needed to
initialize the info. In order to set up the link, the original node is sent a response.
7
3. UAV Routing Protocols
Multi-Layer UAV: These networks consist of heterogeneous UAVs form. The
communication is held in it by the lower layer between the backbone of the UAV.
By the study of Larrieu, N. et al. [5], these UAVs periodically share information on
the zone structure to survey with their respective neighbors.
Multi-Group UAV: Both a centralized network and an ad hoc network work
together to integrate a multi-Group UAV network. Ad hoc backbone connections
link several UAVs to the station in a centralized way.
Surveillance: The category that includes applications that needed UAVs as flying
cameras is surveillance and monitoring. According to the research by Bujari, A. et
al. [6], the jobs often include capturing real-time photos, videos, or audio from
flying objects so that one may go forward and gather sensitive information.
8
Environmental sensing: In the category of environmental sensing, UAVs
function as sensors that gather environmental data in a designated region.
Applications may require sensor data in this situation to evaluate certain
environmental conditions.
Time-dependent mobility: Models for time- and space-dependent mobility. This
mobility model's category aims to prevent abrupt changes in speed and direction.
Different mathematical formulae can be used to carry out the motion change
smoothly.
Path-planned mobility: These mobility models offer a predetermined route
pattern. UAVs randomly switch to another pattern or repeat the same one as if in a
loop after they reach the end of a pattern.
9
4. The Major Attacks on
Network
DDoS attack: Several sites simultaneously launch a distributed denial of service
(DDoS) attack known as DDoS. The study of Verma, A. et al. [7], The device sends
a server or network component to just one target using messages or requests for
connection with the goal to slow it down or possibly crash it.
Packet mistreating attack: The router starts processing the packet improperly
after being injected with malicious information.. By inputting incorrect table
entries, the network might suffer significant damage as a result of this assault.
Hit-and-run attack: To determine if the Internet is up and running. during this
attack, the hacker injects malicious packets into the router. If so, the hacker
transmits further malicious packets in an effort to damage the router.
10
Persistent attacks: The attack is quite damaging and has a very severe
character. By the study of Muzammal, S. M. et al. [8], The router may stop working
if malicious packets are continuously injected.
Sybil attack: It is carried out when a false node assumes many identities
belonging to real nodes. The Sybil attack version known as the "clone ID attack"
involves the attacking node copying the identity of a legitimate node.
Sinkhole attack: When a changed DIO message is broadcast, a sinkhole attack
could happen. Advertisement of a fake route causes nearby nodes to go in the
direction of the bad node.
11
5. Conclusion
This paper discussed the characteristics and algorithms of various forms of routing
networks. The investigation discovered that the dynamic routing protocol makes
better decisions regarding the transfer of packets. FANET network security and
significant network attacks are discussed. FANET supports establishing connections
to these routing devices while maintaining network performance and connectivity.
According to some researchers, mechanisms for network security have been
proposed, and solutions are in the works. The research is for educational purposes
and lacks adequate deployment or testing.
In the future, further research on the routing networks can be done on the neural
network routing algorithms that can apply artificial intelligence to optimize routing
better in FANETs and also need to enhance the security for routers to protect from
12
malicious attacks as well.
6. References
1. Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless net-working: A survey. IEEE
Communications surveys & tutorials, 21(3), 2224-2287.
2. Dalal, S., Manoharan, P., Lilhore, U. K., Seth, B., Simaiya, S., Hamdi, M., & Raahemi-far, K. (2023). Extremely boosted
neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. Journal of Cloud
Computing, 12(1), 1-22.
3. Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2017). SUPERMAN: security using pre-existing routing for mobile ad hoc
networks. IEEE Transactions on Mobile Compu-ting, 16(10), 2927-2940.
4. Yang, H., & Liu, Z. (2019). An optimization routing protocol for FANETs. EURASIP Journal on Wireless Communications
and Networking, 2019(1), 1-8.
5. Maxa, J. A., Mahmoud, M. S. B., & Larrieu, N. (2017). Survey on UAANET routing protocols and network security
challenges. Ad Hoc & Sensor Wireless Networks.
6. Bujari, A., Palazzi, C. E., & Ronzani, D. (2017, June). FANET application scenarios and mobility models. In Proceedings of
the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (pp. 43-46).
7. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the In-ternet of Things: A Review. IEEE
Sensors Journal, 20(11), 5666-5690.
8. Muzammal, S. M., Murugesan, R. K., & Jhanjhi, N. Z. (2020). A comprehensive review on secure routing in internet of
things: Mitigation methods and trust-based approaches. IEEE Internet of Things Journal, 8(6), 4186-4210.
13
Thank you
14