Route Request Flooding Attack Using Trust based Security Scheme in Manet

In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations. Each node acts as an end node as well as a router for other nodes. A Mobile Ad-hoc Network (MANET) is based on self organizing, dynamic structure and freedom of mobility idea. The characteristics like dynamic structure, limited power, restricted bandwidth and continuously changing network routes makes MANET more vulnerable to the attacks and providing the security to it proves to be a challenging area.In this paper,we describe that how the flooding attack occur and the effect of flooding attack. Finally, we present simulation results to show the detrimental effects of Flooding Attack.

[1]  Winston Khoon Guan Seah,et al.  Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.

[2]  Mehmet Gonullu,et al.  Department of Computer Science and Engineering , 2011 .

[3]  M. Mohana Priya A NOVEL TECHNIQUE FOR DEFENDING ROUTING ATTACKS IN OLSR MANET , 2010 .

[4]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[5]  Yu Zhang,et al.  Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks , 2006, PDCAT.

[6]  V. Balakrishnan,et al.  Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).

[7]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[8]  M. Pushpalatha,et al.  Prevention of flooding attacks in mobile ad hoc networks , 2009, ICAC3 '09.

[9]  Marjan Kuchaki Rafsanjani,et al.  Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes , 2008 .

[10]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[11]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[12]  Ian D. Chakeres,et al.  IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols , 2009, RFC.

[13]  D. Jhonson The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .

[14]  Virendra Pal Singh,et al.  Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .

[15]  Krishan Kumar,et al.  Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks , 2014 .

[16]  Thomas H. Clausen,et al.  Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs) , 2009, RFC.

[17]  Futai Zou,et al.  Performance analysis of mobile ad hoc networks under flooding attacks , 2011 .

[18]  M. Pushpalatha,et al.  Performance Analysis of Flooding Attack Prevention Algorithm in MANETs , 2009 .