PN Design Against RREQ Flood Attacks in MANETs

Mobile Adhoc network (MANET) is a wireless LAN(Local Area Network) without central base stations. Hence they are vulnerable to attacks such as flood attacks from intruders. Mobile and wireless devices belonging to MANET are called mobile nodes. The source node and destination node comprise a session pair. If the distance between them is large then the data is sent via intermediate nodes. AODV (Adhoc On Demand Vector) routing protocol offers adaption to dynamic links. When the source node needs route, it disseminates a Route REQuest(RREQ) message to its neighbor nodes in hop by hop manner. A Route REPly(RREP) message is sent back to the source whether it is newly found route or existing valid route. Attackers generate large amount of RREQ packets with out-of-domain IP address as its destination node. During route discovery process of AODV protocol, attackers deplete communication energy and processing resources. So I propose Petri Net (PN) design approach to suppress redundant RREQ packets. It is a power saving technique that is effective to elongate operational lifetime of MANETs. Duplicate copies of RREQ packets received at node are discarded and each node remembers only next hop to reach the host and not the whole

[1]  Qijun Gu,et al.  Analysis of area-congestion-based DDoS attacks in ad hoc networks , 2007, Ad Hoc Networks.

[2]  Binshan Lin,et al.  Exploring airport traffic capability using Petri net based model , 2011, Expert Syst. Appl..

[3]  Shiyong Zhang,et al.  Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[4]  Qiang Liu,et al.  A New Method to Resist Flooding Attacks in Ad Hoc Networks , 2006, 2006 International Conference on Wireless Communications, Networking and Mobile Computing.

[5]  Martin Mauve,et al.  A survey on real-world implementations of mobile ad-hoc networks , 2007, Ad Hoc Networks.

[6]  Yu-Chee Tseng,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, Wirel. Networks.

[7]  Christos Douligeris,et al.  Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.

[8]  T. Nandagopal,et al.  The Broadcast Storm Problem in a Mobile Ad Hoc Network , 1999, MobiCom 1999.

[9]  Pau-Lo Hsu,et al.  Implementation of a Remote Hierarchical Supervision System Using Petri Nets and Agent Technology , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).