Open Access Open Access  Restricted Access Subscription or Fee Access

Removal of Flooding Attacks in Ad Hoc Wireless Networks to Provide Security against Availability Security Service

A. Vani, Dr.D. Sreenivasa Rao

Abstract


Ad hoc wireless networks are infrastructure less networks and formed by mobile nodes. These networks are gaining popularity because of low cost mobiles devices and its ability to provide instant wireless networking capabilities. The communication in ad hoc wireless networks functions properly only if the participating nodes cooperate in routing without any malicious intention. But the ad hoc wireless networks are vulnerable to various attacks because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denial of service type of attacks are possible in ad hoc wireless networks and one of these types of attack is Flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all almost all on demand routing protocols. Due to this flooding attack the interruption of the network is caused and hence availability of the network service is reduced. The current solutions for these types of attacks are mainly cryptographic, which suffer from heavy computational complexity. In this paper RREQ Flooding attack is detected based on Signal strength and time threshold is used to prevent the flooding attack. The performance of the proposed technique is tested in an On-Demand routing protocol(AODV).The results shows that the proposed techniques reduces the effect of the attack by increasing the packet deli vary ratio.

Keywords


Ad Hoc Wireless Networks, Availability, Security, Flooding Attack

Full Text:

PDF

References


Imrich Chlamtac, Marco Conti, Conti, Jennifer J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks “I (2003) pp.13-64, Elseiver publications.

Jie Li and Jien Kato,” Future Trust man agent framework for Mobile Ad hoc Networks”.IEEE Communications Magazine, April 2008.)

Y.sun et al., “Defense of trust management vulnerabilities in distributed networks”, IEEE Communications Magazine, February 2008.

Y.Sun et al., “Information Theoretic Framework of Trust Modeling and Evaluation for ad hoc networks”IEEE JSAC, vol.24, no.2, Feb 2006.

Manel Guerrero Zapata, “Secure ad hoc on-demand distance vector routing,ACM SIGMOBILE Mobile Computing and Communications “Review,v.6 n3,July 2002 [doi>10,1145/581291.581312]

Panagiotis Papadiminitratos and Zygmunt J.Hass,”Secure data Communication in Mobile ad hoc Networks”IEEE JSAC, vol.24, No.2, February 2006.

P.Papadimitratos and Zygmunt J.Haas and Samar.”The Secure Routing Protocol (SRP) for ad hoc Networks.draft-papadimitratos-secure-routing-protocol”00.txt, Dec.2002.

Lidong Zhou and Zygmunt J.HaasHappy sankranti/pongalhttp://crackspider.net/ “ Securing Ad Hoc networks” In Proc IEEE,special issue on network security November/December,1999.

Marjan kuchaki Rafsanjani, Ali Movaghar, and faroukh Koroupi “Investigating Intrusion detection Systems in MANET and Comparing IDSs for detecting Misbehaving Nodes” World Academy of Science, Engineering and Technology 44 2008.

Elizabeth M.Royer, University of California, Santa Barbara Chai-Keong Toh, Georgia Institute of Technology “A review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”IEEE personal communication, Apr1999.

Ping Yi,Zhoulin Dai,Yiping Zhong,Shiyong Zhang”aresisting Flooding Attacks in Ad Hoc Neyworks”Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC’05) 0-7695-2315-3/05$20.00IEEE

Bo-Cang Peng and chiu-Kuo Liang “Prevention techniques for flooding attack in Ad Hoc Networks

Jian-hua Song1,2,Fan Hong1,Yu Zhang1 “effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks “Proceedings of the Seventh International conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT’06)0-7695-2736-1/06$20.0@2006

Venkat Balakrishnan,Vijay Varadharajan and Uday Tupakulu”Mitigating Anonymous Communications” The 2nd International Conference on Wireless broadband and Ultra Wideband Communications(Answerless 2007)0-7695-2842-2/07$25.00@2007

Revathi Venkataraman, M.Pushpalatha, Rishav Khemka and T.Rama Rao “Prevention of flooding attack in mobile ad hoc network”. International Conference on Advances in Computing ,Communication and Control(ICAC3’09)

David B.Johnson David A.Maltz Josh Broch “DSR:The Dynamic Source Routing Protocol for Multi-HopWireles d Hoc Networks”http://www.monarch.cs.cmu.edu/

J.Al-Jaroodi,”Security Issues in Wireless Mobile Ad hoc Networks at the Network layer,” University of Nebraska-Lincoln, Dept.of Computer Science and Engineering, Technical Report TR02-10-07, November 2002.

A.Burg,”ad Hoc networks specific attacks, Seminar on Ad Hoc Networking: concept, applications, and security, Nov., 2003.

D.Sreenivasa Rao, A.Vani”Secure Routing Protocols for wireless ad hoc Networks”Gitam Journal of Information Communication Technology pp.143-148 Volume-1 July-december-2008.

Virendra Pal singh,sweta Jain ,Jyothi Singhar”Hello Flood Attacks and its Countermeasures in Wireless Sensors networksIJCSI International Journal of Computer science Issues,Vol.7 Issue 3,No.11,May 2010

Shishir K.Shandilya, Sunita Sahu”A Trust Based Security Scheme for RREQ Flooding Attack in MANET” International Journal of Computer Applications (0975-8887) volume 5-no.12, August 2010.

C.Perkins, E.Royer, and S.Das, “Ad hoc On-demand Distance Vector (AODV),”RFC 3561, 2003.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.