Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30184
Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

Authors: Revathi Venkataraman, M. Pushpalatha, T. Rama Rao

Abstract:

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their neighbors. Some others may act malicious by launching active security attacks like denial of service. This paper addresses few related works done on trust evaluation and establishment in ad hoc networks. Related works on flooding attack prevention are reviewed. A new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment. The performance of the trust algorithm is tested in an ad hoc network implementing the Ad hoc On-demand Distance Vector (AODV) protocol.

Keywords: AODV, Flooding, MANETs, trust estimation

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1077217

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2016

References:


[1] Amitabh Mishra, "Security and Quality of Service in Ad hoc Wireless Networks,"pp. 42-57, Cambridge University Press, 2008.
[2] C.Siva Ram Moorthy, B.S. Manoj: Ad hoc Wireless Networks Architectures and Protocols, Prentice Hall, 2004.
[3] Revathi Venkataraman, M.Pushpalatha and T.Rama Rao, "A Graphtheoretic algorithm for detection of multiple wormhole attacks in mobile ad hoc networks". International Journal of Recent Trends in Engineering, Issue 1, Vol.1, May 2009. (Accepted for publication).
[4] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks I(2003)pp. 13-64, Elseiver publications.
[5] Jie Li and Jien Kato, Future Trust Management Framework for Mobile Ad hoc Networks. IEEE Communications Magazine, April 2008
[6] Y.Sun et al., Defense of trust management vulnerabilities in distributed networks, IEEE Communications Magazine, February 2008.
[7] Y.Sun et al., Information Theoretic Framework of Trust Modeling and Evaluation for ad hoc networks. IEEE JSAC, vol.24, no.2, Feb.2006.
[8] Manel Guerrero Zapata, Secure ad hoc on-demand distance vector routing, ACM SIGMOBILE Mobile Computing and Communications Review, v.6 n.3, July 2002
[doi>10.1145/581291.581312]
[9] Panagiotis Papadimitratos and Zygmunt J.Haas, Secure Data Communication in Mobile Ad hoc Networks, IEEE JSAC, Vol.24, No.2, February 2006.
[10] P.Papadimitratos and Z. Hass and P.Samar. The Secure Routing Protocol (SRP) for Ad hoc Networks. Draft-papadimitratos-secure-routingprotocol- 00.txt, Dec.2002.
[11] Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong & Dui Zhoulin, Flooding Attacks and defence in Ad hoc networks. Journal of Systems Engineering and Electronics, VoL. 17, No. 2, pp. 410- 416, 2006.
[12] Venkat Balakrishnan et al. Mitigating Flooding attacks in Mobile Ad hoc Networks Supporting Anonymous Communications. In proceedings of the 2nd International Conference on Wireless and Ultra Wideband Communications (Auswireless 2007).
[13] Revathi Venkataraman, M.Pushpalatha: "Prevention of Flooding Attacks in Mobile Ad hoc Networks" In the proceedings of International Conference on Advances in Computing, Communication and Control, pp. 525-529. January 2009.
[14] Revathi Venkataraman, M. Pushpalatha: Security in Ad Hoc Networks: An extension of dynamic Source Routing in Mobile Ad Hoc Networks. In proceedings of the 10th IEEE International Conference on Communication Systems, Singapore, 2006.
[15] George Theodorakopoulos and John S. Baras, On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. IEEE JSAC, Vol.24. No.2, February 2006.