Forestalling of Flooding Attacks in Wireless Ad Hoc Networks

  IJCOT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© - April Issue 2013 by IJCTT Journal
Volume-4 Issue-4                           
Year of Publication : 2013
Authors : A . Dhana Lakshmi, Dr.V Srikanth,Mr.T Pavan Kumar

MLA

A . Dhana Lakshmi, Dr.V Srikanth,Mr.T Pavan Kumar "Forestalling of Flooding Attacks in Wireless Ad Hoc Networks "International Journal of Computer Trends and Technology (IJCTT),V4(4):787-790 April Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract: -In recent years, security has been the most focused area in ad Hoc networks research. Wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost. Mobile nodes contributes vital role in wireless networks. However consumer electronic devices (mobile nodes) operate under limited energy and battery power and could be vulnerable to security threats easily such as data flooding attacks. Especially while downloading multimedia data flooding attack can be lead to complete disruption of service (denial of service) due to which performance and quality of service may degrade though they follow different routing trusted protocols. We propose a periodic based defense mechanism against denial of service attack to control data packet floods released by an attacker with the aim of enhancing the throughput. After Simulating, outcome shows that the planned scheme enhances the throughput of burst traffic and quality of device. Key words: denial of service attack, data flooding attack, Ad Hoc Networks

 

References-

[1] http://en.wikipedia.org/wiki/Mobile_ad_hoc_network
[2] SearchMobileComputing.com Definitions. ad-hoc network. [Online] (Updated 5 Dec 2000) Available at http://searchmobile computing .techtarget.com/definition Ad hoc-network [Accessed 3 March 2010].
[3] L. Xia and J. Slay, "Securing wireless ad hoc networks: Towards a mobile agent security architecture," the 2nd Australian Information Security Management Conference 2004 (InfoSec 2004), Nov. 2004
[4] M. Al-Shurman, S.-M. Yoo, and S. Park, "Black hole attack in mobile ad hoc networks," the 42nd annual Southeast regional conference ACM Southeast Regional Conference (ACMSE 2004), pp. 96-97, Apr. 2004
[5] Abraham Yaar, Adrian Perrig, Dawn Xiaodong Song, SIFF: A Stateless Internet Flow Filter to Mitigate DDoS FloodingAttacks, IEEE Symposium on Security and Privacy 2004
[6] P. Yi, Z. Dai, Y. Zhong, and S. Zhang, "Resisting flooding Attacks in ad hoc networks," International Conference on Information Technology: Coding and Computing 2005 (ITCC 2005), vol. 2, pp. 657-662, Apr. 2005.
[7] Lidong Zhou, Zygmunt J. Haas, Securing ad hoc Networks, IEEE Networks Special Issue on Network Security,November/December, 1999
[8] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A Secure on-demand routing protocol for ad hoc networks”, In Proc. MobiCom, Sep. 2002, pp. 12–2

Keywords — -sink mobility; routing algorithm; wireless sensor network; swarm intelligence.