CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network

Published on April 2017 by Nupur Agrawal, Upendra Dwivedi
National Conference on Contemporary Computing
Foundation of Computer Science USA
NCCC2016 - Number 1
April 2017
Authors: Nupur Agrawal, Upendra Dwivedi
a6f78a7c-0ad7-45b4-b264-04c38654105e

Nupur Agrawal, Upendra Dwivedi . Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network. National Conference on Contemporary Computing. NCCC2016, 1 (April 2017), 25-28.

@article{
author = { Nupur Agrawal, Upendra Dwivedi },
title = { Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network },
journal = { National Conference on Contemporary Computing },
issue_date = { April 2017 },
volume = { NCCC2016 },
number = { 1 },
month = { April },
year = { 2017 },
issn = 0975-8887,
pages = { 25-28 },
numpages = 4,
url = { /proceedings/nccc2016/number1/27337-6312/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Contemporary Computing
%A Nupur Agrawal
%A Upendra Dwivedi
%T Analysis of Route Discovery Message Flooding Attack in Mobile Ad-Hoc Network
%J National Conference on Contemporary Computing
%@ 0975-8887
%V NCCC2016
%N 1
%P 25-28
%D 2017
%I International Journal of Computer Applications
Abstract

The Mobile ad-hoc network (MANET) is a self-design infra-structure less networks of mobile nodes. Each node in a network acts as a router and can travel on any route in a network. And it also have constantly changing topology. There are various types of attack in Manet which reduce the performance of network. One of them is flooding attack which occurs when a network is heavily loaded with traffic which includes the route request packet for connection. Flooding is the reason for traffic and congestion in the network and also the incompleteness of legal connection. In this paper the detection of flooding attack is done by analyzing the behavior of nodes so that the legal connection can be established. By these analyses the efficiency of the system increases and resource utilization is done properly.

References
  1. Bounpadith Kannhavong, Hidehisa Nakayama, Yoshiaki Nemoto, and Nei kato "Asurvey of routing attacks inmo-bile ad hoc networks",ieee wireless communications oc-tober 2007 85 1536-1284/07/$20. 00 © 2007 ieee
  2. Rashid Hafeez khokhar, MD Asri ngadi, Satria mandala "A review of current routing attacks in mobile ad hoc networks", international journal of computer science and security, volume (z) issue (3)
  3. Yi-an huang and wenke " Attack analysis and detection for adhoc routing protocols" e. jonsson et al. (eds. ): raid 2004, lncs 3224, pp. 125–145, 2004. springer-verlag berlin heidelberg 2004
  4. Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula "Defense against Flooding and Packet Drop Attacks in MANET" INSS Research Group, De-partment of Computing, Macquarie University,North Ryde, Sydney, NSW Australia 2109.
  5. Krishan kumar1, Yogesh kumar2, Gaurav Pruthi "A review of MANET security protocols" ijcsms international journal of computer science and management studies, vol. 11, issue 03, oct 2011
  6. Abhay Kumar, Rai Rajiv Ranjan Tewari, Saurabh Kant Upadhyay "Different types of attacks on integrated MA-NET"-internet communication international journal of computer science and security (ijcss) volume (4): issue (3) 265
  7. Jian-Hua song1, 2, Fan Hong1, Yu Zhang1 "Effective filtering scheme against rreq flooding attack in mobile ad hoc networks " proceedings of the seventh international conference on parallel and distributed computing, appli-cations and technologies (pdcat'06)0- 7695-2736-1/06 $20. 00 © 2006
  8. MS Neetu Singh Chouhan, MS Shweta Yadav "Flooding attack prevention in MANET" international journal of computer technology and electronics engineering (ijctee) volume 1, issue 3
  9. Shishir k. Shandilya, Sunita sahu "A trust based security scheme for rreq flooding attackin MANET",international journal of computer applications (0975 – 8887)volume 5– no. 12, august 2010
  10. Neha Singh , Sumit chaudhary Kapil kumar verma " Explicit query based detection and preventiontechniques for DDOS in MANET", international journal of computer applications (0975 – 8887)volume 53– no. 2, september 2012
  11. Meghna Chhabra and B. B. Gupta, "An Efficient Scheme to Prevent DDOS Flooding Attacks in Mobile Ad-Hoc Network (MANET)", in Research Journal of Applied Sciences, Engineering and Technology, ISSN: 2033-2039, Vol. 7, Issue. 10, March 2014.
  12. HyoJin Kim, Ramachandra Bhargav Chitti and JooSeok Song, "Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks", in Journal of Information Processing Systems, DOI : 10. 3745/JIPS. 2011. 7. 1. 137, Vol. 7, No. 1, March 2011.
Index Terms

Computer Science
Information Sciences

Keywords

Manet Rreq Packets Routing Protocols