MANET is gaining popularity very rapidly but
due to its ad-hoc nature various problems related to security
is found in the network and resources are limited like
bandwidth, battery power. In MANET any node may join
and leave the network any time so it is difficult to
differentiate between the genuine nodes and malicious nodes.
And if the malicious nodes entered in the network many
security attacks are possible like Black hole attack,
Wormhole attack, flooding attacks etc. The proposed work is
for RREQ flooding generated by node to neighbor nodes or
other nodes in the network which intentionally send RREQ
packets to consume the battery power of the legitimate nodes
in the network. In proposed work a history table is
maintained for each node in the network which contains the
RREQ packets values send and received by nodes to other
nodes in sessions. And in order to mitigate the effect of
misbehaving routers or nodes and increase network
performance a threshold value is calculated to restrict the
flooding of RREQ packets. The proposed work facilitates
networking to detect the malicious node in the network;
moreover prevent the flooding attack and preserve Battery
power of nodes.
Published In : IJCAT Journal Volume 2, Issue 10
Date of Publication : October 2015
Pages : 427 - 435
Figures :12
Tables : 04
Publication Link :Detection of Route Discovery Flooding Attack
through Maintaining History Table in MANET
Rupali Dave : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India
Rakesh Verma : Assistant Professor, Department of Computer Science, RGPV University, MITM, Indore, India
Ritu Patidar : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India
Anubha Sharma : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India
Mobile Ad-hoc Networks
RREQ flooding
By analyzing the results of proposed approach the
conclusions come out that if a RREQ flooding attack
occurs, so the detection of the attack is possible through
maintaining a history table of RREQ packets sent and
received by other nodes in the network. And by
restricting the nodes with discard limit battery is
conserved for long timely communication.
Results section clearly indicates the power conservation
of the nodes under attack conditions, thus proposed
work is implemented successfully and performance is
optimized using the proposed method.
[1] Bounpadith Kannhavong, Hidehisa
Nakayama, Yoshiaki Nemoto, and Nei
Kato “A survey of routing attacks in mobile
ad hoc networks”, ieee wireless
communications • October 2007 85 1536-
1284/07/$20.00 © 2007 ieee
[2] Rashid Hafeez Khokhar, MD Asri Ngadi,
Satria mandala “A review of current routing
attacks in mobile ad hoc networks”,
international journal of computer science and
security, volume (z) issue (3)
[3] Yi-an Huang and Wenke “ Attack analysis and
detection for adhoc routing protocols” e.
Jonsson et al.(Eds.): raid 2004, lenses 3224, pp.
125–145, 2004.springer-Verlag Berlin
Heidelberg 2004.
[4] Venkatesan Balakrishnan, Vijay Varadharajan,
Udaya Kiran Tupakula “Defense against
Flooding and Packet Drop Attacks in MANET”
INSS Research Group,Department of
Computing, Macquari university.
[5] Krishan kumar1, Yogesh kumar2, Gaurav
Pruthi “A review of MANET security
protocols” ijcsms international journal of
computer science and management studies, vol.
11, issue 03, Oct 2011.
[6] Abhay Kumar, Rai Rajiv Ranjan Tewari,
Saurabh Kantu upadhyay “Different types of
attacks on integrated MANET”-internet
communication international, journal of
computer science and security (ijcss) volume
(4): issue (3) 265
[7] Jian-Hua song1, 2, Fan Hong1, Yu Zhang1
“Effective filtering scheme against RREQ
flooding attack in mobile ad hoc networks “
proceedings of the seventh international
conference on parallel and distributed
computing, applications and technologies
(pdcat'06)0-7695-2736-1/06 $20.00 © 2006.
[8] MS Neetu Singh Chouhan, MS Shweta
Yadav“Flooding attack prevention in MANET”
international journal of computer technology
and electronics engineering (ijctee) volume 1,
issue 3.
[9] Shishir k. Shandilya, Sunita Sahu “A trust
based security scheme for a RREQ flooding
attack in MANET”, international journal of
computer applications (0975 – 8887)volume 5–
no.12, August 2010.
[10] Neha Singh , Sumit Chaudhary Kapil Kumar
Verma “ Explicit query based detection and
prevention techniques for DDoS in MANET”,
international journal of computer applications
(0975 – 8887)volume 53– no.2, September
2012.