Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Methodology for Detecting and Thwarting DoS in MANET

Print
PDF
Network Security and Cryptography
© 2011 by IJCA Journal
NSC - Number 1
Year of Publication: 2011
Authors:
Kanchan
Sanjeev Rana
10.5120/4322-010

Kanchan and Sanjeev Rana. Article: Methodology for Detecting and Thwarting DoS in MANET. IJCA Special Issue on Network Security and Cryptography NSC(1):31-34, December 2011. Full text available. BibTeX

@article{key:article,
	author = {Kanchan and Sanjeev Rana},
	title = {Article: Methodology for Detecting and Thwarting DoS in MANET},
	journal = {IJCA Special Issue on Network Security and Cryptography},
	year = {2011},
	volume = {NSC},
	number = {1},
	pages = {31-34},
	month = {December},
	note = {Full text available}
}

Abstract

An ad hoc network is the assortment of cooperative wireless nodes without existence of any access point or infrastructure. The presence of malicious nodes in an ad hoc network deteriorates the network performance. A novel approach for malicious nodes detection is proposed here to protect against DoS attack in ad hoc on-demand distance vector routing protocol. The proposed approach employs a method for determining conditions under which malicious node should be monitored. Apart from identification of malicious node, it has been observed that this approach leads to less conservation and less communication breakage in ad hoc routing. The experimental results demonstrate that the proposed approach can effectively detect malicious nodes

Reference

  • Rutvij H. Jhaveri, Ashish D. Patel, Jatin D. Parmar, Bhavin I. Shah, MANET routing pretocols and Warm hole attack against AODV, IJCSNS,VOL.10 No.4,April 2010.
  • Abhay kumar Rai, Rajiv Ranjan Tewari and Saurabh Kant Upadhya, Different types of attack on integrated MANET –Internet Communication.
  • Sonali Bhargava and Dharma P. Agrawal, 2001.IEEE Std 0-7083-7005-8,Security enhancement in AODV protocols for wireless Ad-hoc networks.
  • Gao Xiaopeng, Chen Wei, A Novel Gray Hole Attack detection Scheme for Mobile Ad-hoc Networks, IFIP International Conference on Network and Parallel Computing, 2007.
  • Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhong, Resisting Flooding attacks in Adhoc Networks, IEEE, International Conference on Information Technology: Coding and Computting(ITCC’05).
  • Sidra Akram, Izza Zubair, M Hasan Islam IEEE Std 978-1-4244-4615-5, Fully distributed dynamically configurable firewall to resist DoS attacks in Manet, 2009.
  • Ahsan Habib, Debashish Roy, Steps to Defend against DoS attacks, ICCIT 2009, Dec 2009.
  • M. G. Zapata and N. Asokan, “ Secure Ad hoc Routing Protocols,” in Proceeding of the ACM Workshop on Wireless Security, Atlanta, GA September, 2002.
  • Y. C. Hu, A. Perrig, and D. B. Johnson, “ Ariadne: A Secure On Demand Routing Protocol for Ad hoc Network,” in Proceeding of 8th ACM Int’l, Conf. on Mobile Comp, Georgia, September 2003.
  • Georgy Sklyarenko,”AODV Routing Protocol,” in
  • MatrNr : 3935701*.
  • Sonja Buchegger, Jean-Yves Le Boudec, Nodes bearing Grudges: Towards routing security, Fairness and Robustness in mobile Ad hoc networks.
  • Geng Peng and ZouChuanyun,Routing attacks and solutions in Mobile Ad-hoc Network.