Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32127
Attack Defense of DAD in MANET

Authors: Sehyun Cho, Heasook Park


These days MANET is attracting much attention as they are expected to gratefully influence communication between wireless nodes. Along with this great strength, there is much more chance of leave and being attacked by a malicious node. Due to this reason much attention is given to the security and the private issue in MANET. A lot of research in MANET has been doing. In this paper we present the overview of MANET, the security issues of MANET, IP configuration in MANET, the solution to puzzle out the security issues and the simulation of the proposal idea. We add the method to figure out the malicious nodes so that we can prevent the attack from them. Nodes exchange the information about nodes to prevent DAD attack. We can get 30% better performance than the previous MANETConf.

Keywords: MANETConf, DAD, Attacker, DDOS

Digital Object Identifier (DOI):

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1551


[1] C.E. Perkins, J.T. Malinen, R. Wakikawa, E.M. Belding-Royer, and Y.Sun, "IP Address Autoconfiguration for Ad Hoc Networks, draft-ietf-manet-autoconf-01.txt," Internet Engineering Task Force, MANET Working Group, June 2001.
[2] S. Thonmson and T. Narten, "IPv6 Stateless Address Autoconfiguration," RFC 2462, Dec. 1998
[3] Sanket Nesargi and Ravi Prakash, "MANETConf: Configuration of Hosts in a Mobile Ad hoc Network," In Proceedings of INFOCOM,2002
[4] H. Xhou, L. M. No,and M. W. Mutka, "Passive Address Allocation for MANET," Ad Hoc Networks Journal, vol. 1, issues 4 : pp.424-423, Nov. 2003.
[5] P. Nikander, "Denial-of-Service, Address Ownership, and Early authentication in the IPv6 world," presented at Cambridge Security Protocols Workshop 2001, April 2001.
[6] Josh Broch, David A. Malltz, David B. Jothnson, Yih-Chun Hu, and Jorjeta Jetcheva, "A Performance Comparision of Multi-Hop Wireless Ad Hoc Routing Protocols," Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp.85-97 Oct. 1998.