Skip to main content

Prevention of Flooding Attacks in Mobile Ad Hoc Networks

  • Conference paper
  • First Online:
2nd International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018)

Abstract

Mobile ad hoc network (MANET) in spite of having numerous advantages is still vulnerable to various security breaches. Most of the attacks in MANET are initiated during route discovery process. Flooding attack is found to be most destructive because its severity often leads to exhaustion of resources and bandwidth of MANET. In this paper in order to confront the flooding attack, a new two-step protection method (TSPM) is proposed. The analysis of obtained simulation results with the proposed TSPM establishes that the proposed method detects and isolates the attackers efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Y.C. Tseng, J.R. Jiang, J.H. Lee, Secure bootstrapping and routing in an IPv6-based ad hoc Network. J. Internet Technol 5(2), 123–130 (2004)

    Google Scholar 

  2. H. Yang, H. Lou, F. Ye, S. Lu, L. Zhang, Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 3847 (2004)

    Google Scholar 

  3. Y. Ping, D. Zhoulin, Z. Yiping, Z. Shiyong, Resisting flooding attacks in ad hoc networks, in International Conference on Information Technology: Coding and Computing (2005), pp. 657–662

    Google Scholar 

  4. F.-C. Jiang, C.-H. Lin, H.-W. Wu, Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Netw. 21, 8496 (2014)

    Article  Google Scholar 

  5. E. Zamani, M. Soltanaghaei, The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 5, 8 (2016)

    Google Scholar 

  6. C.E. Perkins, E.M. Royer, Ad-hoc on-demand distance vector routing. Presented at the Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999

    Google Scholar 

  7. M. Elakkiya, N.E. Elizabeth, Opportunistic routing to forgo flooding attacks in MANET. Int. J. Eng. Dev. Res. 34–40 (2014)

    Google Scholar 

  8. C. Perkins, E. Belding-Royer, S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (2003)

    Google Scholar 

  9. B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, A survey of routing attacks in mobile ad hoc networks. Wirel. Commun. 14(5), 85–91 (2007)

    Article  Google Scholar 

  10. R. Mishra, S. Sharma, R. Agrawal, Vulnerabilities and security for ad-hoc networks, in 2010 International Conference on Networking and Information Technology (IEEE, Piscataway, 2010), pp. 192–196

    Google Scholar 

  11. J.-H. Song, F. Hong, Y. Zhang, Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. Presented at the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006

    Google Scholar 

  12. S. Li, Q. Liu, H. Chen, M. Tan, A new method to resist flooding attacks in ad hoc networks, in 2006 International Conference on Wireless Communications, Networking and Mobile Computing (IEEE, Piscataway, 2006), pp. 1–4

    Google Scholar 

  13. Z. Xia, J. Wang, DIMH: a novel model to detect and isolate malicious hosts for mobile ad hoc network. Comput. Stand. Interfaces 28(6), 660669 (2006)

    Article  Google Scholar 

  14. P. Singh, A. Raj, D. Chatterjee, Flood tolerant AODV protocol. Int. J. Comput. Appl. 53(6), 18–27 (2012)

    Google Scholar 

  15. Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong, D. Zhoulin, Flooding attack and defence in ad hoc networks. J. Syst. Eng. Electron. 17(2), 410–416 (2006)

    Article  Google Scholar 

  16. K. Bhuvaneshwari, F.S. Devaraj, PDS- A profile based detection scheme for flooding attack in AODV based MANET. Int. J. Sec. Priv. Trust Manag. 2(3), 17–28 (2013)

    Article  Google Scholar 

  17. R. Venkataraman, M. Pushpalatha, T.R. Rao, Performance analysis of flooding attack prevention algorithm in MANETs. Int. J. Comput. Inf. Eng. 3(8), 2056–2059 (2009)

    Google Scholar 

  18. M.J. Faghihniya, S.M. Hosseini, M. Tahmasebi, Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wirel. Netw. 23(6), 1863–1874 (2017)

    Article  Google Scholar 

  19. M.R. Hasan, Y. Zhao, Y. Luo, G. Wang, R.M. Winter, An effective AODV-based flooding detection and prevention for smart meter network. Procedia Comput. Sci. 129, 454–460 (2018)

    Article  Google Scholar 

  20. H. Kim, R.B. Chitti, J. Song, Handling malicious flooding attacks through enhancement of packet processing technique in mobile Ad Hoc networks. J. Inf. Process. Syst. 7(1), 137–150 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kaur, G., Jain, V.K., Chaba, Y. (2019). Prevention of Flooding Attacks in Mobile Ad Hoc Networks. In: Woungang, I., Dhurandher, S. (eds) 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 27. Springer, Cham. https://doi.org/10.1007/978-3-030-11437-4_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-11437-4_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-11436-7

  • Online ISBN: 978-3-030-11437-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics