CFP last date
20 January 2025
Reseach Article

A Trust Based Security Scheme for RREQ Flooding Attack in MANET

by Sunita Sahu, Shishir K. Shandilya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 12
Year of Publication: 2010
Authors: Sunita Sahu, Shishir K. Shandilya
10.5120/964-1341

Sunita Sahu, Shishir K. Shandilya . A Trust Based Security Scheme for RREQ Flooding Attack in MANET. International Journal of Computer Applications. 5, 12 ( August 2010), 4-8. DOI=10.5120/964-1341

@article{ 10.5120/964-1341,
author = { Sunita Sahu, Shishir K. Shandilya },
title = { A Trust Based Security Scheme for RREQ Flooding Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 12 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number12/964-1341/ },
doi = { 10.5120/964-1341 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:54:05.022308+05:30
%A Sunita Sahu
%A Shishir K. Shandilya
%T A Trust Based Security Scheme for RREQ Flooding Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 12
%P 4-8
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denial of service type of attacks are possible in the MANET and one of these type attack is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol.

References
  1. Lidong Zhou and Zygmunt J. HaasHappy sankranti/pongalhttp://crackspider.net/ “Securing Ad Hoc Networks “In Proc IEEE , special issue on network security, November/December, 1999.
  2. Marjan Kuchaki Rafsanjani, Ali Movaghar, and Faroukh Koroupi” Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes” World Academy of Science, Engineering and Technology 44 2008
  3. Elizabeth M. Royer, University of California, Santa Barbara Chai-Keong Toh, Georgia Institute of Technology” A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”IEEE personal communication,Apr 1999
  4. Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang “Resisting Flooding Attacks in Ad Hoc Networks” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’05) 0-7695-2315-3/05 $ 20.00 IEEE
  5. Bo-Cang Peng and Chiu-Kuo Liang”Prevention techniques for flooding attack in Ad Hoc Networks”
  6. Jian-Hua Song1, 2, Fan Hong1, Yu Zhang1 “Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks “ Proceedings of the Seventh International Conference on Parallel and Distributed Computing,Applications and Technologies (PDCAT'06)0-7695-2736-1/06 $20.00 © 2006
  7. Venkat Balakrishnan, Vijay Varadharajan,and Uday Tupakula” Mitigating Flooding attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications” The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007) 0-7695-2842-2/07 $25.00 © 2007
  8. Revathi Venkataraman, M. Pushpalatha, Rishav Khemka and T. Rama Rao “prevention of flooding attack in mobile ad hoc network”. International Conference on Advances in Computing, Communication and Control (ICAC3’09).
  9. David B. Johnson David A. Maltz Josh Broch “DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks “http://www.monarch.cs.cmu.edu/
  10. Ioanna Stamouli, Patroklos G. Argyroudis, and Hitesh Tewari” Real-time Intrusion Detection for Ad hoc Networks” Proceedings of the Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM’05) 0-7695-2342-0/05 $20.00 © 2005 IEEE
  11. V. Madhu Viswanatham and A.A. Chari”An Approach for Detecting Attacks in Mobile Adhoc Networks” Journal of Computer Science 4 (3): 245-251, 2008 ISSN 1549-3636 © 2008 Science Publications
  12. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad hoc Networks”, In Proc. ACM/IEEE Int’l. Conf. on Mobile Computing and Networking, pp 275-283, 2000.
  13. S. Marti, T.J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehaviour in Mobile Ad hoc Networks”, In Proc. ACM/IEEE Int’l Conf. on Mobile Computing and Networking, pp. 255-265, 2000.
  14. R.Ranjana and M.Rajaram, “Detecting Intrusion Attacks in Ad-hoc Networks," Asian journal in information technology 6(7) 758-761,2007
  15. Dorothy E. Denning” AN INTRUSION-DETECTION MODEL” IEEE transaction on software engineering, vol. 13, no. 7,pp 222-232, Feb 1987.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad-hoc Networks Denial of service Flooding Attack