LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

Defending Against Flooding Attacks in Mobile Ad-Hoc Networks Based on Statistical Analysis

Photo by constant_lb from unsplash

Due to their specific structure and plenty of their utilization, mobile ad-hoc networks are vulnerable to various attacks. An attack which impacts on network layer is referred to as flooding… Click to show full abstract

Due to their specific structure and plenty of their utilization, mobile ad-hoc networks are vulnerable to various attacks. An attack which impacts on network layer is referred to as flooding attack. By transmitting several packets, this attack occupies the processor so that it cannot receive the remaining data and packets. Hence, it causes disruption and disorder in the network. In this paper, for preventing this problem, a method has been proposed based on DSR routing protocol which quickly identifies the flooding attack. Indeed, the proposed method not only identifies and detects the malicious nodes in comparison with valid and proper nodes but also imposes sufficient penalties and reconsiders it again. The method proposed in this paper is called defending against flooding attacks-dynamic source routing. At the outset, it detects misbehavior in the network; then, for discovering malicious nodes, it uses average packet transmission RREQ which measures average transmission route request (RREQ) packets. The results of simulating the proposed method in NS-2 environment indicated that it improved packet delivery rate and end-to-end delay.

Keywords: attacks mobile; mobile hoc; flooding attacks; hoc networks; defending flooding

Journal Title: Wireless Personal Communications
Year Published: 2019

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.