Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2012, Vol 1, Issue 5
Abstract
Mobile ad hoc networks (MANET) is a wireless network where nodes work in standalone fashion. The MANET faces various security challenges due to the environment in which it is deployed. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. One of the major attacks on MANET is denial of service (DOS) attack, which is caused by intruders or malicious nodes. The Flooding attack is one of the DOS attack against on demand routing protocols. In this attack a malicious attack broadcast bulk route request (RREQ) so that all links get overloaded and all bandwidth is consumed. The intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication cannot be kept. When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request. Once the threshold is exceeded, nodes deny any future request packets from the intruder To encounter this attack this paper suggests a mechanism where a node is either member or guest’s based on the trust value and their relationships with their neighboring nodes. RREQ received from members are accepted and RREQ from guest are accepted only after integrity check of the packet and forwarded to other neighbors. The results of our implementation show FAP can prevent the Ad Hoc Flooding attack efficiently.
Authors and Affiliations
D. Karun Kumar Reddy, K. Sandhya Rani Kundra, M. Ratnakar Babu, L Prasanna Kumar
Comparison of EEA3 and EEA1 Algorithms in Terms of Encryption Time and Throughput
EEA3 (Evolved Packet System Encryption Algorithm 3) and EEA1 (Evolved Packet System Encryption Algorithm 1) are confidentiality algorithms that are used to en/decrypt blocks of data. In this paper we present the enc...
Resource Provisioning Techniques in Cloud Computing Environment: A Survey
Cloud Computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, applications and services) that can be rapidly provisioned a...
Generalization Algorithm For Prevent Inference Attacks In Social Network Data
Online social networking has become one of the most popular activities on the web. Online social networks (OS Ns), such as Facebook, are increasingly utilized by many people. OS Ns allow users to control and customiz...
Cooperative and Riskless Data Publishing in Cloud Computing
This paper explains. Proposing a flexible distributed storage integrity auditing mechanism, utilizing the homomorphic token and distributed erasurecoded data. The proposed design allows users to audit the cloud storag...
http://www.ijrcct.org/index.php/ojs/article/view/604/pdf
Mobile Ad hoc Network (MANET) is a self creating, self-configuring and self healing network that is formed automatically by a collection of mobile nodes without the help of a fixed infrastructure or centralized manag...