Open Access Open Access  Restricted Access Subscription or Fee Access

Mitigation of Flooding attack using Defense Mechanism in Mobile Adhoc Networks

M. Muthumeenakshi, Dr. P. Subathra

Abstract


A Mobile Adhoc Network (MANET) is a self configuring network of mobile routers connected by wireless links, which form the topology with low cost on the fly. Because of using some consumer electronic devices which are generally operate on limited battery power and therefore vulnerable to security threats like data flooding attacks. In the data flooding, malicious nodes flood the network by sending useless data packets. These useless data packet exhausts the network resources and hence legitimated user can not able to use the resources for valid communication because of energy drain, buffer drain and so. Hence the period based defense mechanism was proposed against data flooding attacks with the aim of enhancing the throughput in mobile Adhoc networks. Thus identification of the malicious as well as victim node with respect to buffer size is done, defense mechanism is applied against the flooding attack and analyze the performance with and without using defense mechanism in the mobile adhoc networks.

Keywords


Data Flooding Attack, Mobile Adhoc Network, Throughput.

Full Text:

PDF

References


A. Jamalipour, "Self-organizing networks [message from the editor-in-chief]", IEEE Wireless Communications, vol.15, no.6, pp.2-3, Dec.2008.

Hyojin kim, Ramachandra Bhargav Chitti, and JooSeok Song, “Novel Defense Mechanism against Data Flooding Attacks in Wireless Adhoc Networks”, IEEE Transactions on Consumer Electronics, Vol. 56, No. 2, May 2010.

Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao," Performance Analysis of Flooding Attack Prevention Algorithm in MANETs”, World Academy of Science, Engineering and Technology 2009.

S.Desilva and R.V.Boppana, "Mitigating malicious control packet floods in adhoc networks", IEEE Wireless Communications and Networking Conference, (WCNC 2005), vol.4, pp.2112-536, Mar.2005.

S.Li, Q.Liu, H.Chen, and M.Tan, "A new method to resist flooding attacks in ad hoc networks," IEEE Wireless Communications Networking and Mobile Computing, (WiCOM 2006),pp.1-4, Sep.2006.

H.Kim, S.Han, and J.Song, "Handling Malicious Flooding Attacks through Enhancement of Packet Processing. Technique in Mobile Ad Hoc Networks", International Conference on Computational Science, (ICCS2006).

Jim Wu and Mahbub Hassan, “Simulation of a Bandwidth Threshold-Based Packet transformation Algorithm for Internet Routers", School of Computer Science and Software Engineering, Monash university, Sep.2005.

Y.C.Hu, A.Perrig, and D.B.Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols",the 2nd ACM Workshop on Wireless Security, pp.30-40, Sept.2003.

S.J.Lee and M.Gerla, "Split multipath routing with maximally disjoint paths in adhoc networks", IEEE International Conference on Communications (ICC 2001), vol.10, pp.3201-3205, Jun.2001.

S. Han, and J.Song, "Maximum lifetime paths for the high packet delivery ratio using fast recover in a mobile ad hoc network", International Conference on Computational Science 2006.

L.Xia and J.Slay, "Securing wireless ad hoc networks: towards a mobile agent security architecture", the 2nd Australian Information Security Management Conference (InfoSec 2004), Nov.2004.

Y.C.Hu, A.Perrig, D.B.Johnson, "Wormhole attacks in wireless networks, "IEEE Journal on Selected Areas in Communications, vol.24, no.2, Feb.2006.

Bounpadithkann havong, hidehisa nakayama, yoshiakinemoto, "A survey of routing attacks in Mobile Adhoc networks”, IEEE Wireless Communications, Oct.2006.

S.-J. Lee, M. Gerla, and C.-C. Chiang, "On-demand multicast routing protocol," in Proc. Wireless Communications and Networking Conference, 1999, pp. 1298-1302.

C. E. Perkins, E. M. Royer, and S. R. Da s, "IP Flooding in Ad hoc Mobile Networks," in Internet draft (draft-ietf-manet-bcast-02.txt) , 2001.

J.Wu and F.Dai, "Efficient broadcasting with guaranteed coverage in mobile adhoc networks," IEEE Transactions on Mobile Computing ,vol.4, no. 3, 2005, pp. 259-270.

S. Murthy and J. J. Garcia-Luna-Aceves, "An Efficient Routing Protocol for Wireless Networks," ACM Journal on Mobile Networks and Applications, Special Issue on Routing in Mobile Communication Networks, vol. 1, no. 2, 1996, pp. 183-197.

M. G. Zapata and N. Asokan, "Securing adhoc routing protocols," in Proc. 3rd ACM Workshop on Wireless Security, 2002, pp. 1-10.

Virendra Pal Singh, Sweta Jain and Jyoti Singhai, "Hello Flood Attack and its countermeasures in Wireless Sensor Networks," International Journal of Computer Science Issues(IJCSI), Vol. 7, Issue 3, No 11, May 2010

Shishir K. Shandilya Sunita Sahu, “A Trust based Security Scheme for RREQ Flooding attack in MANET”, International Journal of Computer Applications (0975 – 8887) Volume 5– No.12, August 2010.

B. Kannhavong et al., “Analysis of the Node Isolation Attack against OLSR-Based Mobile Ad Hoc Network” 7th Int’l. Symp. Comp. Networks, 2006.

M. Barbeau, J. Hall, and E. Kranakis, "Detecting Impersonation Attacks in Future Wireless and Mobile Networks," in Workshop on Secure Mobile Ad-hoc Networks and Sensors (MADNESS 2005), vol. 4074, LNCS . Singapore: Springer Verlag, 2006.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.