Performance Analysis of Flooding Attack Prevention Algorithm in MANETs

The lack of any centralized infrastructure in mobile ad hoc networks (MANET) is one of the greatest security concerns in the deployment of wireless networks. Thus communication in MANET functions properly only if the participating nodes cooperate in routing without any malicious intention. However, some of the nodes may be malicious in their behavior, by indulging in flooding attacks on their neighbors. Some others may act malicious by launching active security attacks like denial of service. This paper addresses few related works done on trust evaluation and establishment in ad hoc networks. Related works on flooding attack prevention are reviewed. A new trust approach based on the extent of friendship between the nodes is proposed which makes the nodes to co-operate and prevent flooding attacks in an ad hoc environment. The performance of the trust algorithm is tested in an ad hoc network implementing the Ad hoc On-demand Distance Vector (AODV) protocol.




References:
[1] Amitabh Mishra, "Security and Quality of Service in Ad hoc Wireless
Networks,"pp. 42-57, Cambridge University Press, 2008.
[2] C.Siva Ram Moorthy, B.S. Manoj: Ad hoc Wireless Networks
Architectures and Protocols, Prentice Hall, 2004.
[3] Revathi Venkataraman, M.Pushpalatha and T.Rama Rao, "A Graphtheoretic
algorithm for detection of multiple wormhole attacks in mobile ad hoc networks". International Journal of Recent Trends in
Engineering, Issue 1, Vol.1, May 2009. (Accepted for publication).
[4] Imrich Chlamtac, Marco Conti, Jennifer J.-N. Liu, Mobile ad hoc
networking: imperatives and challenges. Ad Hoc Networks I(2003)pp.
13-64, Elseiver publications.
[5] Jie Li and Jien Kato, Future Trust Management Framework for Mobile
Ad hoc Networks. IEEE Communications Magazine, April 2008
[6] Y.Sun et al., Defense of trust management vulnerabilities in distributed
networks, IEEE Communications Magazine, February 2008.
[7] Y.Sun et al., Information Theoretic Framework of Trust Modeling and
Evaluation for ad hoc networks. IEEE JSAC, vol.24, no.2, Feb.2006.
[8] Manel Guerrero Zapata, Secure ad hoc on-demand distance vector
routing, ACM SIGMOBILE Mobile Computing and Communications
Review, v.6 n.3, July 2002 [doi>10.1145/581291.581312]
[9] Panagiotis Papadimitratos and Zygmunt J.Haas, Secure Data
Communication in Mobile Ad hoc Networks, IEEE JSAC, Vol.24, No.2,
February 2006.
[10] P.Papadimitratos and Z. Hass and P.Samar. The Secure Routing Protocol
(SRP) for Ad hoc Networks. Draft-papadimitratos-secure-routingprotocol-
00.txt, Dec.2002.
[11] Yi Ping, Hou Yafei, Bong Yiping, Zhang Shiyong & Dui Zhoulin,
Flooding Attacks and defence in Ad hoc networks. Journal of Systems
Engineering and Electronics, VoL. 17, No. 2, pp. 410- 416, 2006.
[12] Venkat Balakrishnan et al. Mitigating Flooding attacks in Mobile Ad
hoc Networks Supporting Anonymous Communications. In proceedings
of the 2nd International Conference on Wireless and Ultra Wideband
Communications (Auswireless 2007).
[13] Revathi Venkataraman, M.Pushpalatha: "Prevention of Flooding Attacks
in Mobile Ad hoc Networks" In the proceedings of International
Conference on Advances in Computing, Communication and Control,
pp. 525-529. January 2009.
[14] Revathi Venkataraman, M. Pushpalatha: Security in Ad Hoc Networks:
An extension of dynamic Source Routing in Mobile Ad Hoc Networks.
In proceedings of the 10th IEEE International Conference on
Communication Systems, Singapore, 2006.
[15] George Theodorakopoulos and John S. Baras, On Trust Models and
Trust Evaluation Metrics for Ad Hoc Networks. IEEE JSAC, Vol.24.
No.2, February 2006.