Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 14
Year of Publication: 2014
Authors:
Khushboo Sawant
M. K Rawat
10.5120/18268-9309

Khushboo Sawant and M k Rawat. Article: Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment. International Journal of Computer Applications 104(14):5-8, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Khushboo Sawant and M.k Rawat},
	title = {Article: Novel Paradigm: Assessment of DOS Flooding Attack through Energy Aware Routing over MANET Environment},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {14},
	pages = {5-8},
	month = {October},
	note = {Full text available}
}

Abstract

One of the most up-and- coming fields for research is mobile ad hoc network. Security is high Priority obligation in wireless ad-hoc network. In ad hoc network the communicating nodes sets new challenges for the security architecture because it doesn't necessarily feed on fixed infrastructure. In the ad-hoc network denial of service attacks (DOS) forcefully initiate through malicious nodes or attacker which is more vulnerable. In this paper, we are clarify the incident of flooding attack and their exposed to the possibility of being attacked or harmed effects which give chance to a legitimate node for doing dissimilar attacks also. So we get going towards is to recognize the presence or existence of DOS flooding attack using secure routing protocols. This paper proposes a novel mechanism using allowable and limiting threshold for accurately measuring the flooded packets from the usual congestions. Somewhere it also prevents network being down from flooded traffic.

References

  • Ping Yi, Zhoulin Dai, Shiyong Zhang, Yiping Zhong, "New Routing Attack in Mobile Ad Hoc Networks", Journal of Information Technology, 83?94.
  • Abhay Kumar Rai, Rajiv Ranjan Tewari and saurabh Kant Upadhyay, "Different Types of Attacks on Integrated MANET-Internet", Journal of Computer Science and Security, 265-274.
  • Bhupandith Kannhavong, Hideshisa Nakayama, Yoshiaki Nemoto And Nei Kat, "IEEE Wireless Communication, 2007, 85-91.
  • Yi-an Huang and Wenke LeeE. Jonsson , "Springer-Verlag Berlin Heidelberg" 2004RAID 2004, LNCS 3224, 125–145.
  • Kavuri Roshan1 , K. Reddi Prasad2 , Niraj Upadhayaya3 & A. Govardhan4, Journal of Computer Science, 2012, 25-34
  • YihChun Hu , Adrian Perrig, David B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network routing Protocols", 2003, San Diego, California, USA University of Washington.
  • Shishir K. Shandilya, Sunita Sahu,, "A Trust Based Security Scheme for RREQ Flooding Attack in MANET", Journal of Computer Applications (0975 – 8887) , 2010 , 4-8.
  • Ujwala D. Khartad & R. K. Krishna, "Route Request Flooding Attack Using Trust based Security Scheme" , I Journal of Smart Sensors and Ad Hoc Networks, 2012, 27-33.
  • Panagiotis Papadimitratos, Zygmunt J. Haas; Secure Link State Routing For Mobile Ad Hoc Networks
  • Mach. Adnan Nadeem , Michael Howarth, "Adaptive Intrusion Detection & Prevention of Denial of Service attacks in MANETs".
  • Khushboo sawant, Dr. M. k Rawat, "Survey of dos flooding attak over manet Environment", Journal of Engineering Research and Applications, 2014, 110-115.
  • Sapna Choudhary, Alka Agrawal, "Threshold Based Intrusion Detection System for MANET using Machine Learning Approach", l Journal of Advance Electrical and Electronics Engineering, 2278-8948, 2014, 1-6.
  • Sitesh kumar sinha Krishna kumar pandey Mukesh kumar sahu, "Survey of different types of attack and prevention scheme", Journal of Computer Technology and Electronics, 2320 – 0081, 19-24.
  • Gagandeep, Aashima, Pawan Kumar, "Analysis of Different Security Attacks in MANETs on Protocol Stack", Journal of Engineering and Advanced Technology, 2249 – 8958, 2012.
  • D. karun Kumar Reddy, Journal of Research in Computer and Communication technology, 228-237.
  • Aarti, "A Study of MANET: Characteristics, Challenges, Application and Security Attacks", Journal of Advanced Research in Computer Science and Software Engineering, 2013, 252-257.