Advertisement

Prevention of Flooding Attacks in Mobile Ad Hoc Networks

  • Gurjinder Kaur
  • V. K. Jain
  • Yogesh Chaba
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 27)

Abstract

Mobile ad hoc network (MANET) in spite of having numerous advantages is still vulnerable to various security breaches. Most of the attacks in MANET are initiated during route discovery process. Flooding attack is found to be most destructive because its severity often leads to exhaustion of resources and bandwidth of MANET. In this paper in order to confront the flooding attack, a new two-step protection method (TSPM) is proposed. The analysis of obtained simulation results with the proposed TSPM establishes that the proposed method detects and isolates the attackers efficiently.

Keywords

Mobile ad hoc network Malicious node Flooding Routing 

References

  1. 1.
    Y.C. Tseng, J.R. Jiang, J.H. Lee, Secure bootstrapping and routing in an IPv6-based ad hoc Network. J. Internet Technol 5(2), 123–130 (2004)Google Scholar
  2. 2.
    H. Yang, H. Lou, F. Ye, S. Lu, L. Zhang, Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 3847 (2004)Google Scholar
  3. 3.
    Y. Ping, D. Zhoulin, Z. Yiping, Z. Shiyong, Resisting flooding attacks in ad hoc networks, in International Conference on Information Technology: Coding and Computing (2005), pp. 657–662Google Scholar
  4. 4.
    F.-C. Jiang, C.-H. Lin, H.-W. Wu, Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Netw. 21, 8496 (2014)CrossRefGoogle Scholar
  5. 5.
    E. Zamani, M. Soltanaghaei, The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 5, 8 (2016)Google Scholar
  6. 6.
    C.E. Perkins, E.M. Royer, Ad-hoc on-demand distance vector routing. Presented at the Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999Google Scholar
  7. 7.
    M. Elakkiya, N.E. Elizabeth, Opportunistic routing to forgo flooding attacks in MANET. Int. J. Eng. Dev. Res. 34–40 (2014)Google Scholar
  8. 8.
    C. Perkins, E. Belding-Royer, S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (2003)Google Scholar
  9. 9.
    B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, A survey of routing attacks in mobile ad hoc networks. Wirel. Commun. 14(5), 85–91 (2007)CrossRefGoogle Scholar
  10. 10.
    R. Mishra, S. Sharma, R. Agrawal, Vulnerabilities and security for ad-hoc networks, in 2010 International Conference on Networking and Information Technology (IEEE, Piscataway, 2010), pp. 192–196Google Scholar
  11. 11.
    J.-H. Song, F. Hong, Y. Zhang, Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. Presented at the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006Google Scholar
  12. 12.
    S. Li, Q. Liu, H. Chen, M. Tan, A new method to resist flooding attacks in ad hoc networks, in 2006 International Conference on Wireless Communications, Networking and Mobile Computing (IEEE, Piscataway, 2006), pp. 1–4Google Scholar
  13. 13.
    Z. Xia, J. Wang, DIMH: a novel model to detect and isolate malicious hosts for mobile ad hoc network. Comput. Stand. Interfaces 28(6), 660669 (2006)CrossRefGoogle Scholar
  14. 14.
    P. Singh, A. Raj, D. Chatterjee, Flood tolerant AODV protocol. Int. J. Comput. Appl. 53(6), 18–27 (2012)Google Scholar
  15. 15.
    Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong, D. Zhoulin, Flooding attack and defence in ad hoc networks. J. Syst. Eng. Electron. 17(2), 410–416 (2006)CrossRefGoogle Scholar
  16. 16.
    K. Bhuvaneshwari, F.S. Devaraj, PDS- A profile based detection scheme for flooding attack in AODV based MANET. Int. J. Sec. Priv. Trust Manag. 2(3), 17–28 (2013)CrossRefGoogle Scholar
  17. 17.
    R. Venkataraman, M. Pushpalatha, T.R. Rao, Performance analysis of flooding attack prevention algorithm in MANETs. Int. J. Comput. Inf. Eng. 3(8), 2056–2059 (2009)Google Scholar
  18. 18.
    M.J. Faghihniya, S.M. Hosseini, M. Tahmasebi, Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wirel. Netw. 23(6), 1863–1874 (2017)CrossRefGoogle Scholar
  19. 19.
    M.R. Hasan, Y. Zhao, Y. Luo, G. Wang, R.M. Winter, An effective AODV-based flooding detection and prevention for smart meter network. Procedia Comput. Sci. 129, 454–460 (2018)CrossRefGoogle Scholar
  20. 20.
    H. Kim, R.B. Chitti, J. Song, Handling malicious flooding attacks through enhancement of packet processing technique in mobile Ad Hoc networks. J. Inf. Process. Syst. 7(1), 137–150 (2011)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Gurjinder Kaur
    • 1
  • V. K. Jain
    • 1
  • Yogesh Chaba
    • 2
  1. 1.Sant Longowal Institute of Engineering and TechnologyLongowalIndia
  2. 2.Guru Jambheshwar University of Science and TechnologyHisarIndia

Personalised recommendations