Abstract
In this paper we present a technique to defend against Broken Link Fraud, a denial of service attack against Destination Sequenced Distance Vector. Each node in the network keeps track of the frequency of next hop for each destination. Next hop is blacklisted if frequency exceeds a threshold. Our method does not rely on expensive cryptographic techniques making it suitable for energy constrained Mobile Ad hoc NETworks. Simulation results demonstrate effectiveness of our method in blacklisting misbehaving node, resulting in improved Packet Delivery Ratio.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Perkins, C.E., Bhagwat, P.: Highly dynamic destination-sequenced distance-vector routing for mobile computers. SIGCOMM Comput. Commun. Rev. 24(4), 234–244 (1994)
Kaur, R., Gaur, M.S., Suresh, L., Laxmi, V.: DOS attacks in MANETs: Detection and Counter-measures. In: Santanam, R., Sethumadhavan, M., Virendra, M. (eds.) Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, pp. 124–145. IGI Global, US (2011). doi:10.4018/978-1-60960-123-2.ch010
Kaur, R., Gaur, M.S., Laxmi, V.: A novel attack model simulation in DSDV routing. In: 4th International Conference on New Technologies, Mobility and Security (NTMS’11), Paris, France (2011)
Wang, W., Lu, Y., Bhargava, B.: On security study of two distance vector routing protocols for mobile Ad Hoc networks. IICPCC, pp. 179–186, March 2003
Smith, B.R., Murthy, S., Garcia-Luna Aceves, J.J.: Securing distance-vector routing protocols. In: Proceedings of the 1997 Symposium on Network and Distributed System Security (SNDSS’97), IEEE Comput. Soc, p. 85, Washington, DC, USA (1997)
Hu, Y.C., Johnson, D.B., Perrig A.: SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks. In: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13 (2002)
Wan, T., Kranakis, E., Van Oorschot, P.C.: Securing the destination-sequenced distance vector routing protocol (S-DSDV). In: Information and Communication Security, LNCS, vol. 3269, pp. 311–318. Springer, Heidelberg (2004)
Wang, S.Y., Lin, C.C.: NCTUns 5.0: A network simulator for IEEE 802. 11(p) and 1609 Wireless Vehicular Network Researches. IEEE International Symposium on Wireless Vehicular Communication, September 2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag London Limited
About this paper
Cite this paper
Kaur, R., Laxmi, V., Gaur, M.S. (2011). Detection of Broken Link Fraud in DSDV Routing. In: Gelenbe, E., Lent, R., Sakellari, G. (eds) Computer and Information Sciences II. Springer, London. https://doi.org/10.1007/978-1-4471-2155-8_53
Download citation
DOI: https://doi.org/10.1007/978-1-4471-2155-8_53
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-2154-1
Online ISBN: 978-1-4471-2155-8
eBook Packages: EngineeringEngineering (R0)