An ad hoc network is a collection of mobile nodes that dynamically form a temporary network and are capable of communicating with each other without the use of a network infrastructure or any centralized administration. Due to open medium, dynamic topology, distributed cooperation, constrained capabilities ad hoc networks are vulnerable to many types of security attacks, one such attack is rushing attack. It is a malicious attack that is directed against on demand routing protocols that uses duplicate suppression at each node. The attacker exploits this property in order to prevent communication between the important nodes in the network. To achieve this, it will try to be a part of the route that the source node uses to transmit data to the destination node. By capturing the route successfully, the attacker will disrupt the exchange of packets between the nodes, thus resulting in denial-of-service [1]. This paper focuses on the security of dynamic source routing (DSR) protocol in order to prevent the rushing attack. Based on the simulation study, it is observed that, the new protocol is successful in preventing the rushing attack and provides security even against the strongest rushing attackers with a negligible increase in the end-to-end delay. The new protocol not only enhances the security but also enhances the basic properties of DSR, so that throughput and packet delivery ratio is increased during data transmission.
[1]
Pietro Michiardi,et al.
Security in ad hoc networks
,
2003
.
[2]
Anupam Joshi,et al.
Secure Routing and Intrusion Detection in Ad Hoc Networks
,
2005,
Third IEEE International Conference on Pervasive Computing and Communications.
[3]
Zygmunt J. Haas,et al.
Securing ad hoc networks
,
1999,
IEEE Netw..
[4]
Yih-Chun Hu,et al.
Rushing attacks and defense in wireless ad hoc network routing protocols
,
2003,
WiSe '03.
[5]
Charles E. Perkins,et al.
Performance comparison of two on-demand routing protocols for ad hoc networks
,
2001,
IEEE Wirel. Commun..
[6]
H Deng,et al.
ROUTING SECURITY IN AD HOC NETWORKS
,
2002
.
[7]
J. Broach,et al.
The dynamic source routing protocol for mobile ad-hoc networks
,
1998
.
[8]
Yih-Chun Hu,et al.
A survey of secure wireless ad hoc routing
,
2004,
IEEE Security & Privacy Magazine.
[9]
Jorge Nuevo.
A Comprehensible GloMoSim Tutorial
,
2004
.