Lifetime elongation of ad hoc networks under flooding attack using power-saving technique

نویسندگان

  • Fuu-Cheng Jiang
  • Chu-Hsing Lin
  • Hsiang-Wei Wu
چکیده

Without the management of centralized unit, mobile ad hoc networks (MANETs) are vulnerable to security threats from flooding attacks launched through compromised nodes or intruders. When a source node needs a data session with a destination node, it disseminates a route request (RREQ) message to its neighbors in a hop-by-hop manner. One crucial type of flooding attacks called RREQ flooding appears to be inevitably proliferated in wireless networks. In the RREQ flooding attack, attackers would launch massive RREQ packets with out-of-domain IP address as its destination node. The forwarding services conducted by all intermediate nodes exhaust their energy and processing resources. The proposed approach can suppress redundant RREQ packets using the co-operation of destination node and neighbor nodes within one-hop range of the attacking node. A Petri Net design was developed to model the proposed approach and configure all relevant system aspects in a concise fashion for qualitative analysis. From quantitative viewpoint, relevant network simulations were conducted to validate the proposed scheme using a NS2 network simulator. The experimental result reveals that the proposed power-saving technique can be applied to economically and effectively elongate the operational lifetime of MANETs under flooding attack. 2014 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improving Quality of Service Routing in Mobile Ad Hoc Networks Using OLSR

Mobile ad hoc networks (MANET) are constructed by mobile nodes without access point. Since MANET has certain constraints, including power shortages, an unstable wireless environment and node mobility, more power-efficient and reliable routing protocols are needed. The OLSR protocol is an optimization of the classical link state algorithm. OLSR introduces an interesting concept, the multipoint r...

متن کامل

LEBRP - A Lightweight and Energy Balancing Routing Protocol for Energy-Constrained Wireless Ad Hoc Networks

A wireless ad hoc network typically refers to any set of wireless networks where all devices have equal status on a network and are free to associate with any other wireless ad hoc network devices in their range. As the nature of these networks, they commonly do not have external power supplies, and each node has a limited internal power source. In this paper, we put forward a new routing proto...

متن کامل

A Survey of Solutions to Protect Against All Types of Attacks in Mobile Ad Hoc Networks

In recent years mobile networks have expanded dramatically, compared with other wireless networks. Routing protocols in these networks are designed with the assumption that there is no attacker node, so routing protocols are vulnerable to various attacks in these networks. In this paper, we review the network layer attacks and then we simulate the impact of black hole attack on ad hoc on demand...

متن کامل

Securing AODV routing protocol against the black hole attack using Firefly algorithm

Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...

متن کامل

A New Routing Attack in Mobile Ad Hoc Networks

Mobile ad hoc networks will often be deployed in environments where the nodes of the networks are unattended and have little or no physical protection against tampering. The nodes of mobile ad hoc networks are thus susceptible to compromise. The networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a ne...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Ad Hoc Networks

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2014