Research of Secure Scheme against Data Flooding Attack in Ad Hoc Networks

Article Preview

Abstract:

DATA flooding attack is a serious menace for the security of on-demand routing protocol in Ad Hoc networks. In the paper, on the basis of three typical on-demand routing protocols AODV, DSR and TORA, we present a special security scheme against data flooding attack. Then we simulate the scheme on NS2 platform and compare two performance parameters before and after using the scheme: average delay and packet delivery rate. The results indicate that this project is comparatively effective to resist the DATA flooding attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 204-210)

Pages:

395-399

Citation:

Online since:

February 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Seung Yi, Prasad Naldu, Technical Report: UIUCDCS-R-(2001)-2241.

Google Scholar

[2] Manel Guerrero Zapata, Secure Ad Hoc On-Demand Distance Vector(SAODV) Routing, draft-guerrero -manet-saodv-OS. txt. February (2005).

Google Scholar

[3] P. Papadimitratos, Z. Haas, Secure routing for mobile Ad Hoc networks, In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference(CNDS). Jan. (2002).

DOI: 10.1109/cnds.2011.5764561

Google Scholar

[4] HU Y C, PERRIG A, JOHNSON D B, Ariadne: a secure on-demand routing protocol for Ad Hoc networks, Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom). Westin Peachtree Plaza, Dec. ( 2002).

DOI: 10.1145/570645.570648

Google Scholar

[5] Yih-Chun Hu, D.B. Johnson, A. Perrig. SEAD: secure efficient distance vector routing for mobile wireless Ad Hoc networks, Ad Hoc Networks, (2003), pp.175-192.

DOI: 10.1016/s1570-8705(03)00019-2

Google Scholar

[6] K. Sanzgiri, B. Dahill, B. N. Levine, A secure routing protocol for Ad Hoc networks, IEEE Journals on Selected Areas in Communications Special issue on Wireless Ad Hoc Networks, Mar. (2005).

DOI: 10.1109/icnp.2002.1181388

Google Scholar

[7] Yi Ping, Zhong Yiping, DOS Attack and Defense in Mobile Ad Hoc Networks, Computer Research and Development, Apr. (2005), pp.697-704.

DOI: 10.1360/crad20050425

Google Scholar

[8] Zhang Yue, Research on Ad Hoc Secure Routing with Privacy Preserving, Master Thesis of Xi dian University, Jan. (2006).

Google Scholar