CFP last date
20 January 2025
Reseach Article

Effect of Rushing Attack in AODV and Its Prevention Technique

by Gajendra Singh Chandel, Rajul Chowksi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 83 - Number 16
Year of Publication: 2013
Authors: Gajendra Singh Chandel, Rajul Chowksi
10.5120/14531-2925

Gajendra Singh Chandel, Rajul Chowksi . Effect of Rushing Attack in AODV and Its Prevention Technique. International Journal of Computer Applications. 83, 16 ( December 2013), 10-15. DOI=10.5120/14531-2925

@article{ 10.5120/14531-2925,
author = { Gajendra Singh Chandel, Rajul Chowksi },
title = { Effect of Rushing Attack in AODV and Its Prevention Technique },
journal = { International Journal of Computer Applications },
issue_date = { December 2013 },
volume = { 83 },
number = { 16 },
month = { December },
year = { 2013 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume83/number16/14531-2925/ },
doi = { 10.5120/14531-2925 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:59:33.409080+05:30
%A Gajendra Singh Chandel
%A Rajul Chowksi
%T Effect of Rushing Attack in AODV and Its Prevention Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 83
%N 16
%P 10-15
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The MANET incorporates mobile nodes that forward information or packets from node to node without a wired connection. The topology changes rapidly and unproductively, there is no central control for routing of packets hence the communication is on mutual trust. There are many proposed routing protocol in which on-demand routing is most preferable among all as its overhead is very low. Thus attention has been paid on developing a secure reactive protocol against various attacks. In this proposed work effect of rushing attack is presented over AODV. This attack results in denial-of-services and is effectively damaging as it can also be performed by weak attacker. Thus we develop a Rushing attack prevention (RAP) is a generic rushing attack prevention mechanism for the reactive protocols. In this proposed work AODV protocol is used for study of rushing attack and implemented the proposed techniques over it then compared the results of AODV with attack and with prevention technique.

References
  1. Bing Wu, Jianmin Chen and Jie Wu, Mihaela Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Springer© 2006, pp. 1-38.
  2. Yin-Chun Hu, Adrian Perrig and David B. Johnson, "Rushing attack and Defense in Wireless Ad Hoc Network Routing Protocols", Wise 2003, San Diego, California, USA.
  3. S. Albert Rabara, and S. Vijayalakshmi, "Rushing attack Mitigation in Multicast MANET (RAM3), IJRRCS,Vol. 1, No. 4, December 2010, pp. 131-138.
  4. Rusha Nandy, and Debdutta Barman Roy, "Study of Various Attacks in MANET and Elaborative Discussion of Rushing Attack on DSR with clustering scheme", International Journal of Advanced Networking and Application, Vol. 3, Issue 01, 2011, pp. 1035-1043.
  5. Supriya and Manju Khari, "MANET Security Breaches: Threat to a Secure Communication Platform", IJANS, Vol. 2, No. 2, April 2012, pp. 45-51.
  6. Shobha Arya and Chandrakal Arya, "Malicious Nodes Detection in Mobile Ad Hoc Networks", Journal of Information and Operations Management, Vol. 3, No. 1, 2012, pp. 210-212.
  7. S. Desilva, and R. V. Boppana, "Mitigating Malicious Control PacketFloods In Ad Hoc Networks,"Proceedings of IEEE Wireless Communications and Networking Conference 2005, , vol. -4, pp. 2112-2117, March 2005.
  8. Y. Guo, S. Gordon, S. Perreau, "A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks," Wireless Communications and Networking Conference, IEEE (WCNC 2007), pp. 3105-3110, March 2007.
  9. Sudhir Agrawal, Sanjeev Jain and Sanjeev Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks," Journal Of Computing, Volume 3, Issue 1, January 2011.
  10. V. Palanisamy and P. Annadurai, " Impact of Rushing attack on Multicast in Mobile Ad Hoc Network," International Journal of Computer Science and Information Security (IJCSIS), Vol. 4, No. 1 & 2, 2009.
  11. Hyojin Kim , Ruy de Oliveira, Bharat Bhargava and JooSeok Song, "A Novel Robust Routing Scheme against Rushing Attacks in Wireless Ad Hoc Networks. " Published online: 12 July 2012© Springer Science+Business Media, LLC. 2012.
  12. Satyam Shrivastava and Sonali Jain, "A brief introduction of different types of security attacks in found in Mobile Ad-hoc Networks," International Journal of Computer Science & Engineering Technology (IJCSET), Vol. 4, No. 3, March 2013.
  13. Satyam Shrivastava," Rushing Attack and its Prevention Techniques, "International Journal of Application or
  14. Innovation in Engineering and Management (IJAIM), Vol. 2, No. 4, April 2013, ISSN 2319 – 4847.
  15. Swarnali Hazra1 and S. K. Setua, "Rushing Attack Defending Context Aware Trusted Aodv In Ad-Hoc Network," International Journal of Security, Privacy and Trust Management (IJSPTM), Vol. 1, No 3/4, August 2012.
  16. Gajendra Singh Chandel and Rajul Chowksi, "Study of Rushing attack in MANET," International journal of ucterion (IJCA), Vol. 79, No. 10, Oct. 2013.
Index Terms

Computer Science
Information Sciences

Keywords

MANET rushing attack RAP Reactive Protocol AODV