A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks

The use of Mobile Ad-hoc Networks (MANETs) has increased manifold in recent times. Reactive routing protocols like AODV [6] and DSR [7], used in MANETs, flood the network with route requests whenever a new route is to be discovered. This technique of flooding can be easily misused by malicious nodes to disrupt the network. Generally all nodes have a limit beyond which requests cannot be sent. Malicious nodes can easily bypass this limit and send out large numbers of fabricated route requests in the network, flooding other nodes which ultimately waste all of their processing and battery power in forwarding them. As a result, genuine route requests get ignored and many routes do not get a chance to form. In this paper, we propose a method by which this malicious flooding of route requests can be effectively controlled. We show by means of reasoning and simulation that our scheme enhances the efficiency and throughput of the network.

[1]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[2]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[3]  Manel Guerrero Zapata Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .

[4]  Peng Ning,et al.  How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.

[5]  Sugata Sanyal,et al.  Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks , 2004, IWDC.

[6]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.