Skip to main content

Distributed Cooperative Algorithm to Mitigate Hello Flood Attack in Cognitive Radio Ad hoc Networks (CRAHNs)

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 507))

Abstract

Cognitive radio technology was first introduced by J. Mitola in 1999 to solve the problem of spectrum scarcity for wireless communication. A Cognitive Radio Ad hoc Network (CRAHN) is one of the cognitive radio-based architectures in which wireless unlicensed nodes communicate in infrastructureless environment. Each node in CRAHN has the cognitive capability of sensing the surrounding radio environment for accessing the underutilized licensed spectrum in an opportunistic manner. But those unlicensed users (secondary users) should not make any interference to the communication of licensed users (primary users). In CRAHNs, each node operates as an end system and also as a router to forward packets for multi-hop communication. Due to the dynamic topology, time and space-varying spectrum availability and lack of centralized system, CRAHNs are vulnerable to various security attacks. Hello flood attack is a network layer attack in CRAHNs which can drain off the limited resources of CRAHN nodes by making excessive flooding of hello messages in the network. The proposed distributed cooperative algorithm mitigates the hello flood attack in CRAHNs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. León, O., Hernández‐Serrano, J., & Soriano, M.: Securing cognitive radio networks. international journal of communication systems, 23(5), 633–652 (2010).

    Google Scholar 

  2. Clancy, T. C., & Goergen, N.: Security in cognitive radio networks: Threats and mitigation. In Cognitive Radio Oriented Wireless Networks and Communications, 2008. CrownCom 2008. 3rd International Conference on (pp. 1–8). IEEE (2008, May).

    Google Scholar 

  3. El-Hajj, W., Safa, H., & Guizani, M.: Survey of security issues in cognitive radio networks. Journal of Internet Technology, 12(2), 181–198 (2011).

    Google Scholar 

  4. León, O., Román, R., & Hernández-Serrano, J.: Towards a cooperative intrusion detection system for cognitive radio networks. In NETWORKING 2011 Workshops (pp. 231–242). Springer Berlin Heidelberg (2011, January).

    Google Scholar 

  5. Chakeres, I. D., & Belding-Royer, E. M.: The utility of hello messages for determining link connectivity. In Wireless Personal Multimedia Communications, 2002. The 5th International Symposium on (Vol. 2, pp. 504–508). IEEE (2002, October).

    Google Scholar 

  6. Perkins, C., Belding-Royer, E., & Das, S.: Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561) (2003).

    Google Scholar 

  7. Singh, V. P., Ukey, A. S. A., & Jain, S.: Signal strength based hello flood attack detection and prevention in wireless sensor networks. International Journal of Computer Applications (0975–8887) Volume (2013).

    Google Scholar 

  8. Dubey, P., & Chaudhary, S.: A Survey-Cognitive Radio Network Attacks & Preventions (2014).

    Google Scholar 

  9. Wanjari, A., & Dhamdhere, M. V. Node Verification to Prohibit Flooding Attack in Mobile Ad-hoc Network.

    Google Scholar 

  10. Royer, E. M., & Toh, C. K.: A review of current routing protocols for ad hoc mobile wireless networks. Personal Communications, IEEE, 6(2), 46–55 (1999).

    Google Scholar 

  11. Balakrishnan, V., Varadharajan, V., Tupakula, U., & Moe, M. E. G.: Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications. In Wireless Broadband and Ultra Wideband Communications, 2007. AusWireless 2007. The 2nd International Conference on (pp. 29–29). IEEE (2007, August).

    Google Scholar 

  12. Shandilya, S. K., & Sahu, S.: A trust based security scheme for RREQ flooding attack in MANET. International journal of computer applications, 5(12), 0975–8887 (2010).

    Google Scholar 

  13. Devaraj, A. F. S.: Examination of Impact of Flooding attack on MANET and to accentuate on Performance Degradation. Int. J. Advanced Networking and Applications, 4(04), 1695–1699 (2013).

    Google Scholar 

  14. Madhavi, S., & Duraiswamy, K.: Flooding attack aware secure AODV. Journal of Computer Science, 9(1), 105 (2013).

    Google Scholar 

  15. Hu, Y. C., Perrig, A., & Johnson, D. B.: Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30–40). ACM (2003, September).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anjali Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Science+Business Media Singapore

About this paper

Cite this paper

Gupta, A., Hussain, M. (2017). Distributed Cooperative Algorithm to Mitigate Hello Flood Attack in Cognitive Radio Ad hoc Networks (CRAHNs). In: Satapathy, S., Prasad, V., Rani, B., Udgata, S., Raju, K. (eds) Proceedings of the First International Conference on Computational Intelligence and Informatics . Advances in Intelligent Systems and Computing, vol 507. Springer, Singapore. https://doi.org/10.1007/978-981-10-2471-9_25

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-2471-9_25

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-2470-2

  • Online ISBN: 978-981-10-2471-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics