Trust Based Security Scheme for RREQ Flooding Attack in MANET

Trust Based Security Scheme for RREQ Flooding Attack in MANET



Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denial of service type of attacks are possible in the MANET and one of these type attack is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol. Mobile ad hoc networks have been gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANET is a collection of mobile node with routing capabilities and connected with wireless link. Mobile node can directly communicate to each other if they fall in the radio coverage range of each other . In order to forward the packet to the node which are beyond the coverage range, MANET uses the concept of multi hop communication. Nodes in the MANET are free to move, which dynamically changes the topology of the network. It does not require any expensive infrastructure to support the mobility . Creating the Ad hoc networks is possible where implementation of infrastructure is not possible or expensive. MANET are generally formed for short range communication. The performance/speed of the network depends on the number of devices; it degrades as the number of device increases because all the devices shares the available network resources. Like conventional wired network MANET also uses routing protocols to route the packets to its destination. Ad hoc networks routing protocols are divided into two categories: Proactive and reactive . Proactive routing protocols are also known as table driven routing .In this, all the nodes store the routing information about other node present in the networks and routing updates are propagated in the network whenever network topology changes. The advantage of proactive routing protocol is that node experiences minimal delay when route is needed and unexpired route is available in the routing table but the disadvantage of proactive routing is that these are not scalable and maintenance of routing table requires substantial network resources. In the case of reactive routing protocol, route between the nodes is searched only when node wants to communicate with other node. To discover the routes they use route discovery procedure which in turns uses the flooding method. In this, initiator forwards the RREQ packet to all of its neighbor’s. If neighbor has the route for destination they reply otherwise forward the RREQ to the next node. In this way RREQ packet reaches to the destination which sends the reply to RREQ. But the method which is used to facilitate route discovery are used by the Intruders or the malicious node to consume the network resources which may lead to flooding attack. In this paper, we propose a novel technique which uses the DSR on demand routing protocol to reduce the effect of RREQ flooding attack in the networks with high node mobility. The organization of this paper is as follows. Section 2 provides the overview of related work. Section 3 described the Flooding attacks and its types. Section 4 presents the DSR routing protocol. Section 5 presents our proposal to prevent the RREQ flooding attack. Section 6 shows the result of the proposed technique, and finally, the section 7 concludes the paper.

Free download research paper



Related

Security Aware Ad Hoc Routing for Wireless Networks

DYNAMIC LOAD BALANCING OF FINE-GRAIN SERVICES USING PREDICTION BASED ON SERVICE INPUT-free thesis CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER