Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network

Print
PDF
International Journal of Computer Applications
© 2013 by IJCA Journal
Volume 67 - Number 5
Year of Publication: 2013
Authors:
Anita Namdev
Vineet Richharia
Vivek Richharia
10.5120/11393-6692

Anita Namdev, Vineet Richharia and Vivek Richharia. Article: Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network. International Journal of Computer Applications 67(5):28-33, April 2013. Full text available. BibTeX

@article{key:article,
	author = {Anita Namdev and Vineet Richharia and Vivek Richharia},
	title = {Article: Efficient DoS Attacks Detection Technique in Mobile Ad-hoc Network},
	journal = {International Journal of Computer Applications},
	year = {2013},
	volume = {67},
	number = {5},
	pages = {28-33},
	month = {April},
	note = {Full text available}
}

Abstract

MANETs are dynamic peer-to-peer networks, which employ multi-hop information transfer without requiring an infrastructure. Due to their nature, they have unique security requirements. Traditional security mechanisms used in infrastructure networks may be inapplicable to MANETs. For example, the dynamic and transient nature of MANETs can result in constant changes in trust among nodes. MANETs suffers from not only the vulnerabilities as their infrastructure counterparts, but also peculiar threats and attacks (e. g. , sleep deprivation, selfish misbehaving and Denial of Service (DoS) attacks) caused by unique characteristics of MANETs. Also, once a route is formed, any node in the route may turn malicious and may refrain from forwarding packets, modify them before forwarding or may even forward to an incorrect intermediate node. In this paper they proposed a flow based detection approach that uses novel detection features to identify the attacks in MANET. In our simulation, the results show that the secure is still efficient in discovering secure routes compared with normal model in MANET.

References

  • Wenchao Huang, Yan Xiong, Depin Chen, "DAAODV: A Secure Ad-hoc Routing Protocol based on Direct Anonymous Attestation", IEEE 2009 International Conference on Computational Science and Engineering, Issue Date : 29-31 Aug. 2009, Volume : 2 , On page(s): 809 , Print ISBN: 978-1-4244-5334-4 INSPEC Accession Number: 10915441.
  • A. H Azni, Azreen Azman, Madihah Mohd Saudi, AH Fauzi, DNF Awang Iskandar, "Analysis of Packets Abnormalities in Wireless Sensor Network" , IEEE 2009 Fifth International Conference on MEMS NANO, and Smart Systems, pp 259-264.
  • Cuirong Wang, Shuxin Cai, "AODVsec: A Multipath Routing Protocol in Ad-Hoc Networks for Improving Security", IEEE 2009 International Conference on Multimedia Information Networking and Security, pp 401-404.
  • A Nagaraju and B. Eswar, "Performance of Dominating Sets in AODV Routing protocol for MANETs", IEEE 2009 First International Conference on Networks & Communications, pp 166-170.
  • Sheng Cao and Yong Chen, "AN Intelligent MANet Routing Method MEC", 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, pp 831-834.
  • C. Ng, P. Thubert, M. Watari, and F. Zhao, "Network Mobility Route Optimization Problem Statement," RFC 4888, July 2007.
  • Li-Li PAN, "Research and Simulation for Secure Routing Protocol Based on Ad Hoc Network", IEEE 2010 2nd International Conforence on Education Technology and Computer (ICETC), pp 46-49.
  • Liza Lai-Yee Shek and Yu-Kwong Kwok. " Resource Management Schemes for Bluetooth Scatternets". International Conference on Parallel Processing Workshops (ICPPW'03), 2003 IEEE.
  • Bin Zhen, Jonghun Park and Yongsuk Kim. ," Scatternet Formation of bluetooth Ad-hoc Networks", Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS'03) 0-7695, 2002 IEEE.
  • Sharifah Suhaila Mohd. Ramli, Halabi Hasbulla", Energy-Efficient Handover. Algorithm for Bluetooth Network", 2008 IEEE.