CFP last date
20 December 2024
Reseach Article

Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment

by Khushboo Sawant, M.k Rawat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 14
Year of Publication: 2014
Authors: Khushboo Sawant, M.k Rawat
10.5120/18268-9309

Khushboo Sawant, M.k Rawat . Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment. International Journal of Computer Applications. 104, 14 ( October 2014), 5-8. DOI=10.5120/18268-9309

@article{ 10.5120/18268-9309,
author = { Khushboo Sawant, M.k Rawat },
title = { Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 14 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 5-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number14/18268-9309/ },
doi = { 10.5120/18268-9309 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:36:07.894427+05:30
%A Khushboo Sawant
%A M.k Rawat
%T Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 14
%P 5-8
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the most up-and- coming fields for research is mobile ad hoc network. Security is high Priority obligation in wireless ad-hoc network. In ad hoc network the communicating nodes sets new challenges for the security architecture because it doesn't necessarily feed on fixed infrastructure. In the ad-hoc network denial of service attacks (DOS) forcefully initiate through malicious nodes or attacker which is more vulnerable. In this paper, we are clarify the incident of flooding attack and their exposed to the possibility of being attacked or harmed effects which give chance to a legitimate node for doing dissimilar attacks also. So we get going towards is to recognize the presence or existence of DOS flooding attack using secure routing protocols. This paper proposes a novel mechanism using allowable and limiting threshold for accurately measuring the flooded packets from the usual congestions. Somewhere it also prevents network being down from flooded traffic.

References
  1. Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong, "New Routing Attack in Mobile Ad Hoc Networks", Journal of Information Technology, 83?94.
  2. Abhay Kumar Rai, Rajiv Ranjan Tewari and saurabh Kant Upadhyay, "Different Types of Attacks on Integrated MANET-Internet", Journal of Computer Science and Security, 265-274.
  3. Bhupandith Kannhavong, Hideshisa Nakayama, Yoshiaki Nemoto And Nei Kat, "IEEE Wireless Communication, 2007, 85-91.
  4. Yi-an Huang and Wenke LeeE. Jonsson , "Springer-Verlag Berlin Heidelberg" 2004RAID 2004, LNCS 3224, 125–145.
  5. Kavuri Roshan1 , K. Reddi Prasad2 , Niraj Upadhayaya3 & A. Govardhan4, Journal of Computer Science, 2012, 25-34
  6. YihChun Hu , Adrian Perrig, David B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network routing Protocols", 2003, San Diego, California, USA University of Washington.
  7. Shishir K. Shandilya, Sunita Sahu,, "A Trust Based Security Scheme for RREQ Flooding Attack in MANET", Journal of Computer Applications (0975 – 8887) , 2010 , 4-8.
  8. Ujwala D. Khartad & R. K. Krishna, "Route Request Flooding Attack Using Trust based Security Scheme" , I Journal of Smart Sensors and Ad Hoc Networks, 2012, 27-33.
  9. Panagiotis Papadimitratos, Zygmunt J. Haas; Secure Link State Routing For Mobile Ad Hoc Networks
  10. Mach. Adnan Nadeem , Michael Howarth, "Adaptive Intrusion Detection & Prevention of Denial of Service attacks in MANETs".
  11. Khushboo sawant, Dr. M. k Rawat, "Survey of dos flooding attak over manet Environment", Journal of Engineering Research and Applications, 2014, 110-115.
  12. Sapna Choudhary, Alka Agrawal, "Threshold Based Intrusion Detection System for MANET using Machine Learning Approach", l Journal of Advance Electrical and Electronics Engineering, 2278-8948, 2014, 1-6.
  13. Sitesh kumar sinha Krishna kumar pandey Mukesh kumar sahu, "Survey of different types of attack and prevention scheme", Journal of Computer Technology and Electronics, 2320 – 0081, 19-24.
  14. Gagandeep, Aashima, Pawan Kumar, "Analysis of Different Security Attacks in MANETs on Protocol Stack", Journal of Engineering and Advanced Technology, 2249 – 8958, 2012.
  15. D. karun Kumar Reddy, Journal of Research in Computer and Communication technology, 228-237.
  16. Aarti, "A Study of MANET: Characteristics, Challenges, Application and Security Attacks", Journal of Advanced Research in Computer Science and Software Engineering, 2013, 252-257.
Index Terms

Computer Science
Information Sciences

Keywords

DOS attack Flooding attack Routing Protocols Security and Energy Aware.