CFP last date
20 May 2024
Reseach Article

Enhanced Detection and Recovery from Flooding Attack in MANETs using AODV Routing Protocol

by Shruti Bhalodiya, Krunal Vaghela
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 125 - Number 4
Year of Publication: 2015
Authors: Shruti Bhalodiya, Krunal Vaghela
10.5120/ijca2015905878

Shruti Bhalodiya, Krunal Vaghela . Enhanced Detection and Recovery from Flooding Attack in MANETs using AODV Routing Protocol. International Journal of Computer Applications. 125, 4 ( September 2015), 10-15. DOI=10.5120/ijca2015905878

@article{ 10.5120/ijca2015905878,
author = { Shruti Bhalodiya, Krunal Vaghela },
title = { Enhanced Detection and Recovery from Flooding Attack in MANETs using AODV Routing Protocol },
journal = { International Journal of Computer Applications },
issue_date = { September 2015 },
volume = { 125 },
number = { 4 },
month = { September },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume125/number4/22419-2015905878/ },
doi = { 10.5120/ijca2015905878 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:15:07.641732+05:30
%A Shruti Bhalodiya
%A Krunal Vaghela
%T Enhanced Detection and Recovery from Flooding Attack in MANETs using AODV Routing Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 125
%N 4
%P 10-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile ad-hoc network (MANET) is a self-deliberate data network, where all nodes behave like host or router. MANET is a collection of number of mobile nodes or devices that randomly generate a temporary network. Security is the fundamental requirement in MANET due to its behavior of changing topology, open medium and lack of centralized authentication. This leads to various security attacks in mobile ad hoc network and violate the criteria of routing mechanism. Mobile Ad-hoc network doesn’t need backbone infrastructure support and it is very reliable and also contains the routable networking environment. In this paper, the effect of flooding attack in AODV based network is explained. The network parameters like Throughput, Packet Delivery Fraction (PDF) and End to End Delay are compared with normal network (without flooding attack) and a network with one or more flooder nodes. The performance of network parameters is compared in all the three scenarios. We have proposed a scheme which is finds single or number of malicious nodes in the network and drops fake packets.

References
  1. Pradip M. Jawandhiya and Mangesh M. Ghonge, “A Survey of Mobile Adhoc Network Attacks”, International Journal of Engineering Science and Technology, Vol. 2(9), pp.- 4063-4071, 2010.
  2. A. Mishra and K..M.Nadkarni, Security in Wireless Ad -hoc Network, in Book. “The Hand Book of Ad Hoc Wireless Networks” (chapter 30) , 2003.
  3. Robinpreet Kaur & Mritunjay Kumar Rai, ” A Novel Review on Routing Protocols in MANETs”, Undergraduate Academic Research Journal (UARJ), Volume-1, Issue-1, pp. 103-108, 2012
  4. Siva Ram Murthy and B.S.Manoj, “Ad hoc Wireless Networks”(Chapter 7),2014.
  5. E.M.Royer and C.E.Perkins “Adhoc On-Demand Distance Vector Routing”, IEEE, February 1999.
  6. Datuk Prof Ir Ishak Ismail and Mohd Hairil Fitri Ja’afar,” Mobile Ad Hoc Network Overview”, IEEE, December 2007.
  7. Ruchita Meher and Seema Ladhe,” Review Paper on Flooding Attack in MANET”, International Journal of Engineering Research and Applications, pp. 39-46,January 2014.
  8. Jian-Hua Song, Fan Hong and Yu Zhang, “Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks”, IEEE, 2006.
  9. Monu Singh,Ajay Singh,Rajesh Tanwar and Ritu Chauhan, "Security Attacks in Mobile Adhoc Networks",International Journal of Computer Applications(IJCA), 2011.
  10. Venkat Balakrishnan, Vijay Varadharajan ,and Uday Tupakula” Mitigating Flooding attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications”, IEEE, 2007.
  11. Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao, “Performance Analysis of Flooding Attack Prevention Algorithm in MANETs”, International Scholarly and Scientific Research and Innovation, pp. 421-424, 2009.
  12. Ms. Neetu Singh Chouhan and Ms. Shweta Yadav, "Flooding Attacks Prevention in MANET", in International Journal of Computer Technology and Electronics Engineering (IJCTEE), pp. 68-72, November 2011.
  13. Komal Joshi Veena Lomte, “ Preventing Flooding Attack in MANET Using Node-to-Node Authentication”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 11, pp. 136-140, November 2013.
  14. Kashif Laeeq ,"RFAP, A Preventive Measure against Route Request Flooding Attack in MANETS", IEEE,2012.
  15. Neha K. Holey , Sonal S. Honale, “Various Methods for Preventing Flooding Attack in MANET –A Comparative Analysis”, International Journal of Computing and Technology, Volume 1, Issue 3, pp. 120-122,April 2014.
  16. Teerawat Issariyakul and Ekram Hossain, "Introduction to Network Simulator NS2 manual", 2009 Edition.
Index Terms

Computer Science
Information Sciences

Keywords

MANET AODV routing protocol Flooding attack NS-2.35