Abstract
Mobile ad hoc network (MANET) in spite of having numerous advantages is still vulnerable to various security breaches. Most of the attacks in MANET are initiated during route discovery process. Flooding attack is found to be most destructive because its severity often leads to exhaustion of resources and bandwidth of MANET. In this paper in order to confront the flooding attack, a new two-step protection method (TSPM) is proposed. The analysis of obtained simulation results with the proposed TSPM establishes that the proposed method detects and isolates the attackers efficiently.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Y.C. Tseng, J.R. Jiang, J.H. Lee, Secure bootstrapping and routing in an IPv6-based ad hoc Network. J. Internet Technol 5(2), 123–130 (2004)
H. Yang, H. Lou, F. Ye, S. Lu, L. Zhang, Security in mobile ad hoc networks: challenges and solutions. IEEE Wirel. Commun. 11(1), 3847 (2004)
Y. Ping, D. Zhoulin, Z. Yiping, Z. Shiyong, Resisting flooding attacks in ad hoc networks, in International Conference on Information Technology: Coding and Computing (2005), pp. 657–662
F.-C. Jiang, C.-H. Lin, H.-W. Wu, Lifetime elongation of ad hoc networks under flooding attack using power-saving technique. Ad Hoc Netw. 21, 8496 (2014)
E. Zamani, M. Soltanaghaei, The improved overhearing backup AODV protocol in MANET. J. Comput. Netw. Commun. 5, 8 (2016)
C.E. Perkins, E.M. Royer, Ad-hoc on-demand distance vector routing. Presented at the Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications, 1999
M. Elakkiya, N.E. Elizabeth, Opportunistic routing to forgo flooding attacks in MANET. Int. J. Eng. Dev. Res. 34–40 (2014)
C. Perkins, E. Belding-Royer, S. Das, Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561 (2003)
B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour, A survey of routing attacks in mobile ad hoc networks. Wirel. Commun. 14(5), 85–91 (2007)
R. Mishra, S. Sharma, R. Agrawal, Vulnerabilities and security for ad-hoc networks, in 2010 International Conference on Networking and Information Technology (IEEE, Piscataway, 2010), pp. 192–196
J.-H. Song, F. Hong, Y. Zhang, Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. Presented at the Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, 2006
S. Li, Q. Liu, H. Chen, M. Tan, A new method to resist flooding attacks in ad hoc networks, in 2006 International Conference on Wireless Communications, Networking and Mobile Computing (IEEE, Piscataway, 2006), pp. 1–4
Z. Xia, J. Wang, DIMH: a novel model to detect and isolate malicious hosts for mobile ad hoc network. Comput. Stand. Interfaces 28(6), 660669 (2006)
P. Singh, A. Raj, D. Chatterjee, Flood tolerant AODV protocol. Int. J. Comput. Appl. 53(6), 18–27 (2012)
Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong, D. Zhoulin, Flooding attack and defence in ad hoc networks. J. Syst. Eng. Electron. 17(2), 410–416 (2006)
K. Bhuvaneshwari, F.S. Devaraj, PDS- A profile based detection scheme for flooding attack in AODV based MANET. Int. J. Sec. Priv. Trust Manag. 2(3), 17–28 (2013)
R. Venkataraman, M. Pushpalatha, T.R. Rao, Performance analysis of flooding attack prevention algorithm in MANETs. Int. J. Comput. Inf. Eng. 3(8), 2056–2059 (2009)
M.J. Faghihniya, S.M. Hosseini, M. Tahmasebi, Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network. Wirel. Netw. 23(6), 1863–1874 (2017)
M.R. Hasan, Y. Zhao, Y. Luo, G. Wang, R.M. Winter, An effective AODV-based flooding detection and prevention for smart meter network. Procedia Comput. Sci. 129, 454–460 (2018)
H. Kim, R.B. Chitti, J. Song, Handling malicious flooding attacks through enhancement of packet processing technique in mobile Ad Hoc networks. J. Inf. Process. Syst. 7(1), 137–150 (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kaur, G., Jain, V.K., Chaba, Y. (2019). Prevention of Flooding Attacks in Mobile Ad Hoc Networks. In: Woungang, I., Dhurandher, S. (eds) 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication. WIDECOM 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 27. Springer, Cham. https://doi.org/10.1007/978-3-030-11437-4_15
Download citation
DOI: https://doi.org/10.1007/978-3-030-11437-4_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-11436-7
Online ISBN: 978-3-030-11437-4
eBook Packages: EngineeringEngineering (R0)