We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network

by Anita Namdev, Vineet Richharia, Vivek Richharia
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 5
Year of Publication: 2013
Authors: Anita Namdev, Vineet Richharia, Vivek Richharia
10.5120/11393-6692

Anita Namdev, Vineet Richharia, Vivek Richharia . Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network. International Journal of Computer Applications. 67, 5 ( April 2013), 28-33. DOI=10.5120/11393-6692

@article{ 10.5120/11393-6692,
author = { Anita Namdev, Vineet Richharia, Vivek Richharia },
title = { Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 5 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number5/11393-6692/ },
doi = { 10.5120/11393-6692 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:23:53.643576+05:30
%A Anita Namdev
%A Vineet Richharia
%A Vivek Richharia
%T Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 5
%P 28-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

MANETs are dynamic peer-to-peer networks, which employ multi-hop information transfer without requiring an infrastructure. Due to their nature, they have unique security requirements. Traditional security mechanisms used in infrastructure networks may be inapplicable to MANETs. For example, the dynamic and transient nature of MANETs can result in constant changes in trust among nodes. MANETs suffers from not only the vulnerabilities as their infrastructure counterparts, but also peculiar threats and attacks (e. g. , sleep deprivation, selfish misbehaving and Denial of Service (DoS) attacks) caused by unique characteristics of MANETs. Also, once a route is formed, any node in the route may turn malicious and may refrain from forwarding packets, modify them before forwarding or may even forward to an incorrect intermediate node. In this paper they proposed a flow based detection approach that uses novel detection features to identify the attacks in MANET. In our simulation, the results show that the secure is still efficient in discovering secure routes compared with normal model in MANET.

References
  1. Wenchao Huang, Yan Xiong, Depin Chen, "DAAODV: A Secure Ad-hoc Routing Protocol based on Direct Anonymous Attestation", IEEE 2009 International Conference on Computational Science and Engineering, Issue Date : 29-31 Aug. 2009, Volume : 2 , On page(s): 809 , Print ISBN: 978-1-4244-5334-4 INSPEC Accession Number: 10915441.
  2. A. H Azni, Azreen Azman, Madihah Mohd Saudi, AH Fauzi, DNF Awang Iskandar, "Analysis of Packets Abnormalities in Wireless Sensor Network" , IEEE 2009 Fifth International Conference on MEMS NANO, and Smart Systems, pp 259-264.
  3. Cuirong Wang, Shuxin Cai, "AODVsec: A Multipath Routing Protocol in Ad-Hoc Networks for Improving Security", IEEE 2009 International Conference on Multimedia Information Networking and Security, pp 401-404.
  4. A Nagaraju and B. Eswar, "Performance of Dominating Sets in AODV Routing protocol for MANETs", IEEE 2009 First International Conference on Networks & Communications, pp 166-170.
  5. Sheng Cao and Yong Chen, "AN Intelligent MANet Routing Method MEC", 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp 831-834.
  6. C. Ng, P. Thubert, M. Watari, and F. Zhao, "Network Mobility Route Optimization Problem Statement," RFC 4888, July 2007.
  7. Li-Li PAN, "Research and Simulation for Secure Routing Protocol Based on Ad Hoc Network", IEEE 2010 2nd International Conforence on Education Technology and Computer (ICETC), pp 46-49.
  8. Liza Lai-Yee Shek and Yu-Kwong Kwok. " Resource Management Schemes for Bluetooth Scatternets". International Conference on Parallel Processing Workshops (ICPPW'03), 2003 IEEE.
  9. Bin Zhen, Jonghun Park and Yongsuk Kim. ," Scatternet Formation of bluetooth Ad-hoc Networks", Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) 0-7695, 2002 IEEE.
  10. Sharifah Suhaila Mohd. Ramli, Halabi Hasbulla", Energy-Efficient Handover. Algorithm for Bluetooth Network", 2008 IEEE.
Index Terms

Computer Science
Information Sciences

Keywords

MANET Detection Scheme DoS attacks