Research Article Open Access

Flooding Attack Aware Secure AODV

S. Madhavi1 and K. Duraiswamy1
  • 1 K.S. Rangasamy College of Technology, India

Abstract

Providing security in a Mobile Ad hoc Network (MANET) is a challenging task due to its inherent nature. Flooding is a type of Denial of Service (DoS) attack in MANET. Intentional flooding may lead to disturbances in the networking operation. This kind of attack consumes battery power, storage space and bandwidth. Flooding the excessive number of packets may degrade the performance of the network. This study considers hello flooding attack. As the hello packets are continuously flooded by the malicious node, the neighbor node is not able to process other packets. The functioning of the legitimate node is diverted and destroys the networking operation. Absence of hello packet during the periodical hello interval may lead to wrong assumption that the neighbor node has moved away. So one of the intermediate neighbor nodes sends Route Error (RERR) message and the source node reinitiates the route discovery process. In a random fashion the hello interval values are changed and convey this information to other nodes in the network in a secured manner. This study identifies and prevents the flooding attack. This methodology considers the performance parameters such as packet delivery ratio, delay and throughput. This algorithm is implemented in Secure AODV and tested in ad hoc environment. The result of the proposed algorithm decreases the control overhead by 2%.

Journal of Computer Science
Volume 9 No. 1, 2013, 105-113

DOI: https://doi.org/10.3844/jcssp.2013.105.113

Submitted On: 18 July 2012 Published On: 27 February 2013

How to Cite: Madhavi, S. & Duraiswamy, K. (2013). Flooding Attack Aware Secure AODV. Journal of Computer Science, 9(1), 105-113. https://doi.org/10.3844/jcssp.2013.105.113

  • 3,703 Views
  • 4,706 Downloads
  • 3 Citations

Download

Keywords

  • Hello Packet
  • Flooding
  • MANET
  • Malicious Node