CFP last date
20 December 2024
Reseach Article

Methodology for Detecting and Thwarting DoS in MANET

Published on December 2011 by Kanchan, Sanjeev Rana
Network Security and Cryptography
Foundation of Computer Science USA
NSC - Number 1
December 2011
Authors: Kanchan, Sanjeev Rana
3a00d82b-022a-4037-aa83-0cabc25b0bf1

Kanchan, Sanjeev Rana . Methodology for Detecting and Thwarting DoS in MANET. Network Security and Cryptography. NSC, 1 (December 2011), 31-34.

@article{
author = { Kanchan, Sanjeev Rana },
title = { Methodology for Detecting and Thwarting DoS in MANET },
journal = { Network Security and Cryptography },
issue_date = { December 2011 },
volume = { NSC },
number = { 1 },
month = { December },
year = { 2011 },
issn = 0975-8887,
pages = { 31-34 },
numpages = 4,
url = { /specialissues/nsc/number1/4322-spe010t/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Network Security and Cryptography
%A Kanchan
%A Sanjeev Rana
%T Methodology for Detecting and Thwarting DoS in MANET
%J Network Security and Cryptography
%@ 0975-8887
%V NSC
%N 1
%P 31-34
%D 2011
%I International Journal of Computer Applications
Abstract

An ad hoc network is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. The presence of malicious nodes in an ad hoc network deteriorates the network performance. A novel approach for malicious nodes detection is proposed here to protect against DoS attack in ad hoc on-demand distance vector routing protocol. The proposed approach employs a method for determining conditions under which malicious node should be monitored. Apart from identification of malicious node, it has been observed that this approach leads to less conservation and less communication breakage in ad hoc routing. The experimental results demonstrate that the proposed approach can effectively detect malicious nodes

References
  1. Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah, MANET routing pretocols and Warm hole attack against AODV, IJCSNS,VOL.10 No.4,April 2010.
  2. Abhay kumar Rai, Rajiv Ranjan Tewari and Saurabh Kant Upadhya, Different types of attack on integrated MANET –Internet Communication.
  3. Sonali Bhargava and Dharma P. Agrawal, 2001.IEEE Std 0-7083-7005-8,Security enhancement in AODV protocols for wireless Ad-hoc networks.
  4. Gao Xiaopeng, Chen Wei, A Novel Gray Hole Attack detection Scheme for Mobile Ad-hoc Networks, IFIP International Conference on Network and Parallel Computing, 2007.
  5. Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhong, Resisting Flooding attacks in Adhoc Networks, IEEE, International Conference on Information Technology: Coding and Computting(ITCC’05).
  6. Sidra Akram, Izza Zubair, M Hasan Islam IEEE Std 978-1-4244-4615-5, Fully distributed dynamically configurable firewall to resist DoS attacks in Manet, 2009.
  7. Ahsan Habib, Debashish Roy, Steps to Defend against DoS attacks, ICCIT 2009, Dec 2009.
  8. M. G. Zapata and N. Asokan, “ Secure Ad hoc Routing Protocols,” in Proceeding of the ACM Workshop on Wireless Security, Atlanta, GA September, 2002.
  9. Y. C. Hu, A. Perrig, and D. B. Johnson, “ Ariadne: A Secure On Demand Routing Protocol for Ad hoc Network,” in Proceeding of 8th ACM Int’l, Conf. on Mobile Comp, Georgia, September 2003.
  10. Georgy Sklyarenko,”AODV Routing Protocol,” in
  11. MatrNr : 3935701*.
  12. Sonja Buchegger, Jean-Yves Le Boudec, Nodes bearing Grudges: Towards routing security, Fairness and Robustness in mobile Ad hoc networks.
  13. Geng Peng and ZouChuanyun,Routing attacks and solutions in Mobile Ad-hoc Network.
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV routing protocol Denial of Service Denial of Service