0% found this document useful (0 votes)
13 views14 pages

Static and Dynamic Routing Protocols in Network Security Attacks

The document discusses static and dynamic routing protocols in network security, highlighting the importance of securing data against cyber threats. It covers various routing algorithms, UAV routing protocols, and major network attacks such as DDoS and Sybil attacks. The conclusion emphasizes the need for further research on routing networks and enhancing security measures to protect against malicious attacks.

Uploaded by

Lovedeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views14 pages

Static and Dynamic Routing Protocols in Network Security Attacks

The document discusses static and dynamic routing protocols in network security, highlighting the importance of securing data against cyber threats. It covers various routing algorithms, UAV routing protocols, and major network attacks such as DDoS and Sybil attacks. The conclusion emphasizes the need for further research on routing networks and enhancing security measures to protect against malicious attacks.

Uploaded by

Lovedeep
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Static and Dynamic Routing

Protocols in Network Security


Attacks
INDEX
1. Introduction

2. Algorithms in Routing

3. UAV Routing Protocols

4. The Major Attacks on Network

5. Conclusion

6. References

2
1. Introduction
Networking is exchanging and transporting data between the nodes by the

medium of informative data. Networking provides multiple uses in different fields

or organizations as well as individual users. By the study by Zhang, C. et al. [1],

Monitoring and controlling the plethora of network components has become

impossible due to the rising diversity and complexity of mobile network topologies.

Every organization needs network security to protect its data or

information from the cyber-threats. By Dalal, S. et al. [2], Security in networks is

basically a set of configurations and rules to protect the accessibility and integrity

of networks. It is applied in different fields such as firewall protection, network

access control, cloud security, virtual private networks, and secure web gateway.

3
Fig. 1. Static and dynamic routing

Above in Figure 1, there is shown D1 and D2 are devices, and in static routing R1

and R2 are routers and they use routing that is configured manually to travel by

the network. On the other hand, in dynamic routing R1, R2, R3, and R4 are routers

that use algorithms to determine efficient paths to travel by the network.


4
Several routing protocols were developed that increase the efficiency of the

networks. According to the study by Muzammal, S. M. et al. [3], To secure

communication in network systems, one needs to make sure that it is entirely

secure. A routing protocol for the IoT is called Routing Protocol for Low-Power and

Lossy Networks (RPL). RPL protocol is also used to detect RPL inside attacks using

algorithms.

Fig. 2. The number of increasing network devices and hackers

5
By looking at Figure 2, It is clearly visible that the number of hackers is increasing

every year due to an increase in the statistics of network devices. By network

devices, Hackers can always make use of network equipment for their own gain

and launch phishing attacks.


2. Algorithms in Routing
Reactive Routing: The reactive routing protocol does not need to keep track of

the routing information for every node; instead, it simply generates routes

whenever one of the sources needs to talk. According to research by Yang, H. et al.

[4], FANET routing has an extremely hard architecture.

Proactive Routing: Proactive routing requires each node to have a routing table

with information on how to go from one node to another. Such routers are not

appropriate for FANETs because the rapid mobility of nodes in FANETs frequently

alters the topology of the network.


6
Hybrid Routing: Both reactive and proactive routing is used by the hybrid routing

method. It employs rules to distinguish between domains' reactive and inactive

routing and separates networks into domains.

DSR protocol: It is a reactive routing protocol that extracts information on

topology from the source router.

Route Maintenance: It is used to make the routing table exist in source nodes.

Throughout the transmission procedure data, the router which is developed must

be continually upheld.

Route Discovery: It determines if the node has a target and data needed to

initialize the info. In order to set up the link, the original node is sent a response.

7
3. UAV Routing Protocols
Multi-Layer UAV: These networks consist of heterogeneous UAVs form. The

communication is held in it by the lower layer between the backbone of the UAV.

By the study of Larrieu, N. et al. [5], these UAVs periodically share information on

the zone structure to survey with their respective neighbors.

Multi-Group UAV: Both a centralized network and an ad hoc network work

together to integrate a multi-Group UAV network. Ad hoc backbone connections

link several UAVs to the station in a centralized way.

Surveillance: The category that includes applications that needed UAVs as flying

cameras is surveillance and monitoring. According to the research by Bujari, A. et

al. [6], the jobs often include capturing real-time photos, videos, or audio from

flying objects so that one may go forward and gather sensitive information.
8
Environmental sensing: In the category of environmental sensing, UAVs

function as sensors that gather environmental data in a designated region.

Applications may require sensor data in this situation to evaluate certain

environmental conditions.

Time-dependent mobility: Models for time- and space-dependent mobility. This

mobility model's category aims to prevent abrupt changes in speed and direction.

Different mathematical formulae can be used to carry out the motion change

smoothly.

Path-planned mobility: These mobility models offer a predetermined route

pattern. UAVs randomly switch to another pattern or repeat the same one as if in a

loop after they reach the end of a pattern.

9
4. The Major Attacks on
Network
DDoS attack: Several sites simultaneously launch a distributed denial of service

(DDoS) attack known as DDoS. The study of Verma, A. et al. [7], The device sends

a server or network component to just one target using messages or requests for

connection with the goal to slow it down or possibly crash it.

Packet mistreating attack: The router starts processing the packet improperly

after being injected with malicious information.. By inputting incorrect table

entries, the network might suffer significant damage as a result of this assault.

Hit-and-run attack: To determine if the Internet is up and running. during this

attack, the hacker injects malicious packets into the router. If so, the hacker

transmits further malicious packets in an effort to damage the router.


10
Persistent attacks: The attack is quite damaging and has a very severe

character. By the study of Muzammal, S. M. et al. [8], The router may stop working

if malicious packets are continuously injected.

Sybil attack: It is carried out when a false node assumes many identities

belonging to real nodes. The Sybil attack version known as the "clone ID attack"

involves the attacking node copying the identity of a legitimate node.

Sinkhole attack: When a changed DIO message is broadcast, a sinkhole attack

could happen. Advertisement of a fake route causes nearby nodes to go in the

direction of the bad node.

11
5. Conclusion
This paper discussed the characteristics and algorithms of various forms of routing

networks. The investigation discovered that the dynamic routing protocol makes

better decisions regarding the transfer of packets. FANET network security and

significant network attacks are discussed. FANET supports establishing connections

to these routing devices while maintaining network performance and connectivity.

According to some researchers, mechanisms for network security have been

proposed, and solutions are in the works. The research is for educational purposes

and lacks adequate deployment or testing.

In the future, further research on the routing networks can be done on the neural

network routing algorithms that can apply artificial intelligence to optimize routing

better in FANETs and also need to enhance the security for routers to protect from
12
malicious attacks as well.
6. References
1. Zhang, C., Patras, P., & Haddadi, H. (2019). Deep learning in mobile and wireless net-working: A survey. IEEE

Communications surveys & tutorials, 21(3), 2224-2287.

2. Dalal, S., Manoharan, P., Lilhore, U. K., Seth, B., Simaiya, S., Hamdi, M., & Raahemi-far, K. (2023). Extremely boosted

neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment. Journal of Cloud

Computing, 12(1), 1-22.

3. Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2017). SUPERMAN: security using pre-existing routing for mobile ad hoc

networks. IEEE Transactions on Mobile Compu-ting, 16(10), 2927-2940.

4. Yang, H., & Liu, Z. (2019). An optimization routing protocol for FANETs. EURASIP Journal on Wireless Communications

and Networking, 2019(1), 1-8.

5. Maxa, J. A., Mahmoud, M. S. B., & Larrieu, N. (2017). Survey on UAANET routing protocols and network security

challenges. Ad Hoc & Sensor Wireless Networks.

6. Bujari, A., Palazzi, C. E., & Ronzani, D. (2017, June). FANET application scenarios and mobility models. In Proceedings of

the 3rd Workshop on Micro Aerial Vehicle Networks, Systems, and Applications (pp. 43-46).

7. Verma, A., & Ranga, V. (2020). Security of RPL based 6LoWPAN Networks in the In-ternet of Things: A Review. IEEE

Sensors Journal, 20(11), 5666-5690.

8. Muzammal, S. M., Murugesan, R. K., & Jhanjhi, N. Z. (2020). A comprehensive review on secure routing in internet of

things: Mitigation methods and trust-based approaches. IEEE Internet of Things Journal, 8(6), 4186-4210.

13
Thank you

14

You might also like