Detection of Route Discovery Flooding Attack through Maintaining History Table in MANET  
  Authors : Rupali Dave; Rakesh Verma; Ritu Patidar; Anubha Sharma

 

MANET is gaining popularity very rapidly but due to its ad-hoc nature various problems related to security is found in the network and resources are limited like bandwidth, battery power. In MANET any node may join and leave the network any time so it is difficult to differentiate between the genuine nodes and malicious nodes. And if the malicious nodes entered in the network many security attacks are possible like Black hole attack, Wormhole attack, flooding attacks etc. The proposed work is for RREQ flooding generated by node to neighbor nodes or other nodes in the network which intentionally send RREQ packets to consume the battery power of the legitimate nodes in the network. In proposed work a history table is maintained for each node in the network which contains the RREQ packets values send and received by nodes to other nodes in sessions. And in order to mitigate the effect of misbehaving routers or nodes and increase network performance a threshold value is calculated to restrict the flooding of RREQ packets. The proposed work facilitates networking to detect the malicious node in the network; moreover prevent the flooding attack and preserve Battery power of nodes.

 

Published In : IJCAT Journal Volume 2, Issue 10

Date of Publication : October 2015

Pages : 427 - 435

Figures :12

Tables : 04

Publication Link :Detection of Route Discovery Flooding Attack through Maintaining History Table in MANET

 

 

 

Rupali Dave : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India

Rakesh Verma : Assistant Professor, Department of Computer Science, RGPV University, MITM, Indore, India

Ritu Patidar : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India

Anubha Sharma : Assistant Professor, Department of Computer Science, RGPV University, SVITS, Indore, India

 

 

 

 

 

 

 

Mobile Ad-hoc Networks

RREQ flooding

By analyzing the results of proposed approach the conclusions come out that if a RREQ flooding attack occurs, so the detection of the attack is possible through maintaining a history table of RREQ packets sent and received by other nodes in the network. And by restricting the nodes with discard limit battery is conserved for long timely communication. Results section clearly indicates the power conservation of the nodes under attack conditions, thus proposed work is implemented successfully and performance is optimized using the proposed method.

 

 

 

 

 

 

 

 

 

[1] Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei Kato “A survey of routing attacks in mobile ad hoc networks”, ieee wireless communications • October 2007 85 1536- 1284/07/$20.00 © 2007 ieee [2] Rashid Hafeez Khokhar, MD Asri Ngadi, Satria mandala “A review of current routing attacks in mobile ad hoc networks”, international journal of computer science and security, volume (z) issue (3) [3] Yi-an Huang and Wenke “ Attack analysis and detection for adhoc routing protocols” e. Jonsson et al.(Eds.): raid 2004, lenses 3224, pp. 125–145, 2004.springer-Verlag Berlin Heidelberg 2004. [4] Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula “Defense against Flooding and Packet Drop Attacks in MANET” INSS Research Group,Department of Computing, Macquari university. [5] Krishan kumar1, Yogesh kumar2, Gaurav Pruthi “A review of MANET security protocols” ijcsms international journal of computer science and management studies, vol. 11, issue 03, Oct 2011. [6] Abhay Kumar, Rai Rajiv Ranjan Tewari, Saurabh Kantu upadhyay “Different types of attacks on integrated MANET”-internet communication international, journal of computer science and security (ijcss) volume (4): issue (3) 265 [7] Jian-Hua song1, 2, Fan Hong1, Yu Zhang1 “Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks “ proceedings of the seventh international conference on parallel and distributed computing, applications and technologies (pdcat'06)0-7695-2736-1/06 $20.00 © 2006. [8] MS Neetu Singh Chouhan, MS Shweta Yadav“Flooding attack prevention in MANET” international journal of computer technology and electronics engineering (ijctee) volume 1, issue 3. [9] Shishir k. Shandilya, Sunita Sahu “A trust based security scheme for a RREQ flooding attack in MANET”, international journal of computer applications (0975 – 8887)volume 5– no.12, August 2010. [10] Neha Singh , Sumit Chaudhary Kapil Kumar Verma “ Explicit query based detection and prevention techniques for DDoS in MANET”, international journal of computer applications (0975 – 8887)volume 53– no.2, September 2012.