A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS

Journal Title: Indian Journal of Computer Science and Engineering - Year 2010, Vol 1, Issue 4

Abstract

Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad Hoc Flooding Attack (AHFA), can result in denial of service when used against on-demand routing protocols for mobile ad hoc networks, such as AODV, DSR. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. After analyzed Ad Hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad Hoc Flooding Attack in mobile ad hoc networks. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad Hoc Flooding attack efficiently.

Authors and Affiliations

MR. NALLAMALA SRI HARI , DR. N. SRINIVAS RAO , DR. N. SATYANARAYANA

Keywords

Related Articles

IDENTIFICATION OF MOST RELEVANT FEATURES FOR SENTIMENT ANALYSIS USING HETEROGENIC DOMAIN 

The overwhelming majority of existing approaches to opinion feature extraction accept mining patterns solely from one review corpus, ignoring the nontrivial disparities in word spacing characteristics of opinion options...

OCCLUSION VERIFICATION IN FACE DETECTION AND AGE ESTIMATION USING LOCAL BINARY PATTERN AND DTOD CLASSIFIER USING MORPH DATASET

The purpose of this research work is focused on occlusion conditions in the face like wearing sunglasses and scarf in the eyes and mouth positions of the facial image. The proposed work has three stages. The first stage...

Program and Data Protection: Copyright, Patent, Trade Secret and Trademark

The study of this paper will describe the perspective view of legal issues and propose the alternative approaches to protecting software. Some legal issues like copyright, patent and trademark are used for providing the...

A SURVEY OF TIME SERIES DATA PREDICTION ON SHOPPING MALL

Tremendous amount of data streams are often generated by dynamic environments such as stock’s and bond’s price indices, telecommunications data, audio and video data, Network traffic and data related to various Shopping...

Texture Based Image Clustering Using COM and Spatial Information

Clustering is traditionally viewed as an unsupervised method for data analysis. The primary objective of cluster analysis is to partition a given data set into homogeneous clusters. In this paper, we present a novel algo...

Download PDF file
  • EP ID EP155393
  • DOI -
  • Views 131
  • Downloads 0

How To Cite

MR. NALLAMALA SRI HARI, DR. N. SRINIVAS RAO, DR. N. SATYANARAYANA (2010). A NOVEL ROUTING ATTACK IN MOBILE AD HOC NETWORKS. Indian Journal of Computer Science and Engineering, 1(4), 382-391. https://europub.co.uk/articles/-A-155393