Preventing Flooding Attack In Manets Using The Reserved Bits Of Aodv Messages

Computer Engineering Project Topics

Get the Complete Project Materials Now! »

The flexibility and other advantages of mobile ad-hoc networks come with different security flaws,rnand flooding attack is one of the common attacks in reactive routing protocols. In ad-hoc floodingrnattack, the attacker either broadcasts a lot of route request packets or sends a lot of attacking datarnpackets to exhaust the nodes’ resources. Most of the existing prevention mechanisms are based on thernconcept of rate limit or trust values. In the former mechanisms, flooding attack below the rate limitrncannot be prevented and the later solutions are computationally intensive in high mobility networks.rnThe new prevention mechanism uses the reserved bits of the route request message and one of thernexisting solutions called filtering to prevent flooding attacks from external and internal attackersrnrespectively. While sending route request packets, some information identifying the originator isrnembedded into the reserved bits of the route request message, and the receiver verifies the request byrnchecking the value of the reserved bits or the rate limitation and blacklists the sender if it is anrnattacker. Three scenarios are designed and four performance metrics are used to study the effect of thernflooding attack and the efficiency of the prevention mechanism.rnThe results of the scenarios show that the effect of flooding attack is severe for higher route requestrnflooding rates and increasing rate of attacking data packets. In addition, multiple attackers which dornnot violate the rate limit can also significantly flood a given network. The new prevention solutionrnimproves the network performance in all cases especially if the majority of the attackers are external.rnFor example, the packet delivery ratio for 16 attackers, abiding by a rate limit, is enhanced to aboutrn99% by the new prevention when all the attackers are external and 73% when half of them are internalrncompared to 13.3% in the case of the route request flooding attack. In data flooding too, thernimprovement of the new solution is significant that there is 8.6% of packet delivery ratio increasernwhen all the attackers are external over the data flooding attack with attack rate of 50 packets/s.rnThe simulation, in general, illustrates that if some proportions of the attackers are external, then therernis a considerable improvement in network performance using the new mechanism to prevent bothrnroute request and data flooding attacks as external attackers will be isolated the moment they startrnsending route request packets.rnKeyword: Preventing flooding attack, Data flooding attack, Route request flooding attack, AODV

Get Full Work

Report copyright infringement or plagiarism

Be the First to Share On Social



1GB data
1GB data

RELATED TOPICS

1GB data
1GB data
Preventing Flooding Attack In Manets Using The Reserved Bits Of Aodv Messages

191