A Policy based preventive measure against flooding attack in MANETs

被引:0
|
作者
Kumar, Mohan S. B. [1 ]
Vijay, Anand K. M. [1 ]
Suhas, N. S. [1 ]
机构
[1] Sri Venkateshwara Coll Engn, Dept Elect & Commun Engn, Bengaluru, Karnataka, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT) | 2016年
关键词
MANETs; AODV; Flooding attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad-hoc Network (MANET) is decentralized infrastructure less wireless network with self configuring dynamic nodes. Routing functionality is carried by nodes with the help of routing protocols for effective communication among them. Since routing protocols are major player in network, the intruders target these protocols. One such repudiation attack is Flooding attack. In flooding attack, malicious node randomly generates unusual traffic causing congestion. In this regard, an efficacious (Policy based) scheme has been proposed to detect and prevent malicious nodes in Ad-hoc On Demand Distance Vector (AODV) traffic, there by isolating them from the network. Simulation is performed in NS-allinone-2.34 tool by considering two different scenarios and observed that as number of malicious nodes increases packet delivery ratio can be improved by 20% and also throughput.
引用
收藏
页码:1612 / 1616
页数:5
相关论文
共 50 条
  • [1] RFAP, A Preventive Measure against Route Request Flooding Attack in MANETS
    Laeeq, Kashif
    2012 15TH INTERNATIONAL MULTITOPIC CONFERENCE (INMIC), 2012, : 480 - 486
  • [2] Performance analysis of flooding attack prevention algorithm in MANETs
    Venkataraman, Revathi
    Pushpalatha, M.
    Rama Rao, T.
    World Academy of Science, Engineering and Technology, 2009, 32 : 458 - 461
  • [3] Optimal filter assignment policy against link flooding attack
    Biswas, Rajorshi
    Wu, Jie
    Chang, Wei
    Ostovari, Pouya
    HIGH-CONFIDENCE COMPUTING, 2025, 5 (01):
  • [4] Mobile Agent based Security in MANETS against Sybil Attack
    Aranganathan, A.
    Suriyakala, C. D.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1338 - 1342
  • [5] Dual Security Against Grayhole Attack in MANETs
    Patel, Ankit D.
    Chawda, Kartik
    INTELLIGENT COMPUTING, COMMUNICATION AND DEVICES, 2015, 309 : 33 - 37
  • [6] Securing TORA against Sybil Attack in MANETs
    Thawani, Suraj
    Upadhyay, Hardik
    2015 1ST INTERNATIONAL CONFERENCE ON FUTURISTIC TRENDS ON COMPUTATIONAL ANALYSIS AND KNOWLEDGE MANAGEMENT (ABLAZE), 2015, : 475 - 478
  • [7] AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET
    Vivek Mankotia
    Ramesh Kumar Sunkaria
    Shashi Gurung
    Wireless Personal Communications, 2023, 130 : 1161 - 1190
  • [8] AFA: Anti-Flooding Attack Scheme Against Flooding Attack in MANET
    Mankotia, Vivek
    Sunkaria, Ramesh Kumar
    Gurung, Shashi
    WIRELESS PERSONAL COMMUNICATIONS, 2023, 130 (02) : 1161 - 1190
  • [9] A New Acknowledgment-based Scheme Against Malicious Nodes and Collusion Attack in MANETs
    Heydari, Vahid
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 784 - 788
  • [10] Searching for resources in MANETs - A cluster based flooding approach
    Oliveira, Rodolfo
    Bernardo, Luis
    Pinto, Paulo
    E-BUSINESS AND TELECOMMUNICATION NETWORKS, 2007, 3 : 236 - 245