CFP last date
20 May 2024
Reseach Article

Study of Rushing Attack in MANET

by Gajendra Singh Chandel, Rajul Chowksi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 79 - Number 10
Year of Publication: 2013
Authors: Gajendra Singh Chandel, Rajul Chowksi
10.5120/13781-1654

Gajendra Singh Chandel, Rajul Chowksi . Study of Rushing Attack in MANET. International Journal of Computer Applications. 79, 10 ( October 2013), 43-45. DOI=10.5120/13781-1654

@article{ 10.5120/13781-1654,
author = { Gajendra Singh Chandel, Rajul Chowksi },
title = { Study of Rushing Attack in MANET },
journal = { International Journal of Computer Applications },
issue_date = { October 2013 },
volume = { 79 },
number = { 10 },
month = { October },
year = { 2013 },
issn = { 0975-8887 },
pages = { 43-45 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume79/number10/13781-1654/ },
doi = { 10.5120/13781-1654 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:52:42.200064+05:30
%A Gajendra Singh Chandel
%A Rajul Chowksi
%T Study of Rushing Attack in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 79
%N 10
%P 43-45
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A mobile ad-hoc network or MANET incorporates mobile nodes that forward information or packets from node to node without a wired connection. This is the topology changes rapidly and unproductively, there is no central control for routing of packets. The communication is on mutual trust. There are many proposed routing protocol, on-demand routing is most preferable among all as its overhead is very low. This significantly attention has been paid on developing a secure reactive protocol against various attacks. In this paper a survey and study about rushing attack is provided. This attack results in denial-of-services and is effectively damaging as it can also be performed by weak attacker. Thus a Rushing attack prevention (RAP); generic rushing attack prevention mechanism introduced for the reactive protocols.

References
  1. Bing Wu, Jianmin Chen and Jie Wu, Mihaela Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Springer© 2006, pp. 1-38.
  2. Yin-Chun Hu, Adrian Perrig and David B. Johnson, "Rushing attack and Defense in Wireless Ad Hoc Network Routing Protocols", Wise 2003, San Diego, California, USA.
  3. S. Albert Rabara, and S. Vijayalakshmi, "Rushing attack Mitigation in Multicast MANET (RAM3), IJRRCS,Vol. 1, No. 4, December 2010, pp. 131-138.
  4. Rusha Nandy, and Debdutta Barman Roy, "Study of Various Attacks in MANET and Elaborative Discussion of Rushing Attack on DSR with clustering scheme", International Journal of Advanced Networking and Application, Vol. 3, Issue 01, 2011, pp. 1035-1043.
  5. Supriya and Manju Khari, "MANET Security Breaches: Threat to a Secure Communication Platform", IJANS, Vol. 2, No. 2, April 2012, pp. 45-51.
  6. Shobha Arya and Chandrakal Arya, "Malicious Nodes Detection in Mobile Ad Hoc Networks", Journal of Information and Operations Management,Vol. 3, No. 1, 2012, pp. 210-212.
  7. S. Desilva, and R. V. Boppana, "Mitigating Malicious Control PacketFloods In Ad Hoc Networks,"Proceedings of IEEE Wireless Communications and Networking Conference 2005, vol. -4, pp. 2112-2117, March 2005.
  8. Y. Guo, S. Gordon, S. Perreau, "A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks," Wireless Communications and Networking Conference, IEEE (WCNC 2007), pp. 3105-3110, March 2007.
  9. Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks," Journal Of Computing, Volume 3, Issue 1, January 2011.
Index Terms

Computer Science
Information Sciences

Keywords

MANET rushing attack RAP Reactive Protocol.