Call for Paper - September 2020 Edition
IJCA solicits original research papers for the September 2020 Edition. Last date of manuscript submission is August 20, 2020. Read More

DoS Attack Prevention Technique DSR Protocol based on Signal Strength

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Rakesh Dhatarwal, D. M. Nagar
10.5120/ijca2017914311

Rakesh Dhatarwal and D M Nagar. DoS Attack Prevention Technique DSR Protocol based on Signal Strength. International Journal of Computer Applications 167(6):17-22, June 2017. BibTeX

@article{10.5120/ijca2017914311,
	author = {Rakesh Dhatarwal and D. M. Nagar},
	title = {DoS Attack Prevention Technique DSR Protocol based on Signal Strength},
	journal = {International Journal of Computer Applications},
	issue_date = {June 2017},
	volume = {167},
	number = {6},
	month = {Jun},
	year = {2017},
	issn = {0975-8887},
	pages = {17-22},
	numpages = {6},
	url = {http://www.ijcaonline.org/archives/volume167/number6/27775-2017914311},
	doi = {10.5120/ijca2017914311},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Ad Hoc network is a network that is not any fixed physical structure and is established with mobile nodes using wireless connections. Ad Hoc network is highly flexible and use dynamic network topology. Thus, the efficiency of the routing protocol will affect the all network performance. Dynamic Source Routing (DSR) is one of the extensively used routing protocols for packet transfer from source to destination. It relies on maintaining most recent information, for which, each ad-hoc node maintains hop count and sequence number field. Mobile ad hoc networks carriage many types of security problems, initiated by their open systems and nature of collaborative by limited accessibility of resources.

In this paper, his propose an improved version of DSR routing protocol using neighbor monitoring Scheme which prevents dos attack and accomplishes in maintaining Integrity Security Standard by following minimum hop count path. In GDSR a neighbor monitoring has been detected the routing and packet forwarding vulnerabilities for an incoming demand that helps to stabile its security and efficiency of incoming messages. GDSR DSR routing scheme is evaluated by simulation and results show that improved FPR, throughput and ETE delay can be obtained using simulator.

References

  1. Rahiman, M. Abdul, et al. "Code Aware Dynamic Source Routing for Distributed Sensor Network." International Conference on Communication Systems and Network Technologies (CSNT-2013), Gwalior, India. 2013.
  2. Hamad, S.; Noureddine, H.; Al-Raweshidy, H., "LSEA: Link Stability and Energy Aware for efficient routing in Mobile Ad Hoc Network,"14th International Symposium on Wireless Personal Multimedia Communications 2011(WPMC’11), pp.1-5, Oct. 2011.
  3. AbdJali, Kamarularifin, Zaid Ahmad, and Jamalul-Lail Ab Manan. "Mitigation of Black Hole Attacks for DSR Routing Protocol." (2011).
  4. T. Jin, G. Noubir, B. Thapa, "Zero Pre-shared Secret Key Establishment in the Presence of Jammers", MOBIHOC 2009, New Orleans, Louisiana, USA, 2009, pp. 219-228.
  5. Yafeng Zhou; Sang-Hwa Chung; Lihua Yang; "A Link- Quality Aware Routing Metric for Multi-hop Wireless Network," International Conference on Communication Software and Networks, 2009(ICCSN’09)., pp.390-394, 27-28 Feb. 2009.
  6. D. Boneh, D. Freeman, J. Katz, and B. Waters, “Signing a linear subspace: Signature schemes for network coding,” in Public Key Cryptography- PKC 2009, ser. Lecture Notes in Computer Science 5443.Springer Verlag, 2009, pp. 68–87.
  7. Effatparvar, M.R.; Yazdani, N.; Lahooti, F.; EffatParvar, M., "Link Stability Approach and Scalability Method on ODMRP in Ad Hoc Networks," Communication Networks and Services Research Conference, 2009(NSR ’09)., pp.416-421, 11-13 May 2009.
  8. J. Dong, R. Curtmola, and C. Nita-Rotaru, “Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks,”in ACM conference on Wireless network security - WiSec ’09.ACM, 2009, pp. 111–122.
  9. D. Charles, K. Jain, and K. Lauter, “Signatures for network coding,” International Journal in Information and Coding Theory, vol. 1, no. 1,pp. 3–14, 2009.
  10. “Secure network coding for wireless mesh networks: Threats,challenges, and directions,” Computer Communication, vol. 32, no. 17,pp. 1790–1801, 2009.
  11. Wu, C.; K.; Kato,"AMANET protocol considering link stability and bandwidth efficiency", International Conference on Ultra-Modern Telecommunications & Workshops, 2009(ICUMT ’09), pp.18, 12-14 Oct. 2009.
  12. A. Dhananjay, H. Zhang,"Practical, Distributed Channel Assignment and Routing in Dual-radio Mesh Networks", SIGCOMM 2009, Aug 2009, pp. 99 – 110.
  13. H. Huang, X. Cao, and X. Jia, "Channel assignment using block design in wireless mesh networks", Computer Communication, vol.32,2009, pp.1148-1153.
  14. S. Katti, H. Rahul, W. Hu, D. Katabi, M. M´edard, and J. Crowcroft, “XORs in the air: practical wireless network coding,” IEEE/ACM Transactions on Networking, vol. 16, no. 3, pp. 497–510, 2008.
  15. P. Dutta, S. Jaiswal, R. Rastogi, "Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks", INFOCOM 2008, pp. 2216-2224.
  16. Peng Yang, "QoS Routing Protocol Based on Link Stability with Dynamic Delay Prediction in MANET," Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 2008. ,vol.1, pp.515-518, 19-20 Dec. 2008.
  17. P. Sarkar, “A New Universal Hash Function and Other Cryptographic Algorithms Suitable for Resource Constrained Devices,” Cryptology ePrint Archive, Report 2008/216, 2008.
  18. P. Dutta, S. Jaiswal, R. Rastogi, "Globally Optimal Channel Assignment for Non-Cooperative Wireless Networks", INFOCOM 2008, pp. 2216-2224.
  19. Kar, K., Luo, X., Sarkar, S, "Throughput-Optimal Scheduling in Multichannel Access Point Networks Under Infrequent Channel Measurements", INFOCOM 2007, 26th IEEE International Conference on Computer Communications, May 2007, pp. 1640 –1648.
  20. YingZhiZeng, JinShu Su, Xia Yan, BaoKang Zhao, QingYuan Huang. "LBKERS: A New Efficient Key Management Scheme for Wireless Sensor Networks". the 3rd International Conference on Mobile Ad-hoc and Sensor Networks (MSN), Beijing, China, 2007,pp. 772-783.
  21. A. Haq, A. Naveed and S. S. Kanhere, "Securing Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks",in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC -2007), Hong Kong, March 2007, pp.3113-3118.
  22. Lin, X., Rasool, S.A, "Distributed Joint Channel-Assignment, Scheduling and Routing Algorithm for Multi-Channel Ad-hoc Wireless Networks"., 26th IEEE International Conference on Computer Communications (INFOCOM 2007), May 2007, pp. 1118 –1126.
  23. C. Gkantsidis and P. Rodriguez, “Cooperative Security for Network Coding File Distribution,” in IEEE INFOCOM 2006. IEEE, 2006.
  24. A. Naveed, S. S. Kanhere, "Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks",Globecom 2006, Nov. 2006.
  25. Jenn-Hwan Tarng; Bing-Wen Chuang; Fang-Jing Wu, "A Radio-LinkStability-based Routing Protocol for Mobile Ad Hoc Networks," IEEE International Conference on Systems, Man and Cybernetics,2006(SMC’06). , vol.5, pp.3697-3701, 8-11 Oct. 2006.
  26. Rupinder Gill, Jason Smith, Mark Looi and Andrew Clark. "Passive Techniques for Detecting Session. Hijacking Attacks in IEEE 802.11 Wireless networks".In proceedings of AusCERT2005, Gold Coast, Australia, May 2005, pp. 26-38.
  27. Chunxiao Chigan, Leiyuan Li, Yinghua Ye, "Resource-aware selfadaptive security provisioning in mobile ad hoc networks". In proceedings of Wireless Communications and Networking Conference, March 2005, pp. 2118 -2124.
  28. Yan Xia, Ren-Fa Li, Ken-Li Li, "Intrusion Detection Using Mobile Agent in AD Hoc Networks", Proceedings of the International Conference on Machine Learning and Cybernetics, Volume 6, Aug. 2004, pp. 3383-3388.
  29. M. Alicherry, R. Bhatia, L. Li,"Joint Channel Assignment and Routing for Throughput Optimization in Multi-radio Wireless Mesh Networks", MOBICOM 2005, Cologne, Germany, Aug 2005, pp. 58-72.
  30. M. N. Krohn, M. J. Freedman, and D. Mazi`eres, “On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution,” in IEEE Symposium on Security and PrivacyS&P2004.IEEEComputer Society, 2004, pp. 226–240.

Keywords

Security, Integrity, DSR, MANET, DOS, Neighbor Monitoring.