A Policy based preventive measure against flooding attack in MANETs

被引:0
|
作者
Kumar, Mohan S. B. [1 ]
Vijay, Anand K. M. [1 ]
Suhas, N. S. [1 ]
机构
[1] Sri Venkateshwara Coll Engn, Dept Elect & Commun Engn, Bengaluru, Karnataka, India
来源
2016 IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT) | 2016年
关键词
MANETs; AODV; Flooding attack;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile Ad-hoc Network (MANET) is decentralized infrastructure less wireless network with self configuring dynamic nodes. Routing functionality is carried by nodes with the help of routing protocols for effective communication among them. Since routing protocols are major player in network, the intruders target these protocols. One such repudiation attack is Flooding attack. In flooding attack, malicious node randomly generates unusual traffic causing congestion. In this regard, an efficacious (Policy based) scheme has been proposed to detect and prevent malicious nodes in Ad-hoc On Demand Distance Vector (AODV) traffic, there by isolating them from the network. Simulation is performed in NS-allinone-2.34 tool by considering two different scenarios and observed that as number of malicious nodes increases packet delivery ratio can be improved by 20% and also throughput.
引用
收藏
页码:1612 / 1616
页数:5
相关论文
共 50 条
  • [31] Defending Blackhole Attack by Using Acknowledge Based Approach in MANETs
    Wakode, Nikhil G.
    2017 IEEE INTERNATIONAL CONFERENCE ON IOT AND ITS APPLICATIONS (IEEE ICIOT), 2017,
  • [32] Monitoring-Based Differential Privacy Mechanism Against Query Flooding-Based Model Extraction Attack
    Yan, Haonan
    Li, Xiaoguang
    Li, Hui
    Li, Jiamin
    Sun, Wenhai
    Li, Fenghua
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (04) : 2680 - 2694
  • [33] PQQ, a new vitamin as a preventive against heart attack and strokes
    Gaur, M
    Sharma, M
    Eswaran, SV
    JOURNAL OF THE INDIAN CHEMICAL SOCIETY, 2005, 82 (12) : 1065 - 1068
  • [34] A Rule-Based Technique to Detect Router Advertisement Flooding Attack Against BioBizz Web Application
    Aleesa, Ahmed Marwan
    Hassan, Rosilah
    Kamal, Saif Uldun Mostfa
    ADVANCED SCIENCE LETTERS, 2016, 22 (08) : 1887 - 1891
  • [35] ESMBCRT: Enhance Security to MANETs Against Black Hole Attack Using MCR Technique
    Mohammad, Shaik Noor
    Singh, R. P.
    Dey, Abhijit
    Ahmad, Syed Jalal
    INNOVATIONS IN ELECTRONICS AND COMMUNICATION ENGINEERING, 2019, 33 : 319 - 326
  • [36] A novel defense scheme against flooding attack in mobile adhoc networks
    Bhatia T.
    Verma A.K.
    Sharma G.
    Bala S.
    Recent Patents on Engineering, 2018, 12 (01) : 15 - 22
  • [37] A Lightweight Detection Using Bloom Filter against Flooding DDoS Attack
    Choi, Sanghun
    An, Yichen
    Sasase, Iwao
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2020, E103D (12) : 2600 - 2610
  • [38] A Proactive Distance-Based Flooding Technique for MANETs with Heterogeneous Radio Ranges
    Al-Qawasmeh, Abdulla
    Bettayeb, Said
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 633 - 639
  • [39] SYN Flooding Attack Detection Based on Entropy Computing
    Bellaiche, Martine
    Gregoire, Jean-Charles
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1079 - 1084
  • [40] UDP based IP Traceback for Flooding DDoS Attack
    Murugesan, Vijayalakshmi
    Selvaraj, MercyShalinie
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (01) : 103 - 111