a new routing attack in mobile ad hoc networks

Upload: mail2priyaonline

Post on 05-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/31/2019 A New Routing Attack in Mobile Ad Hoc Networks

    1/4

    A New Routing Attack in Mobile Ad Hoc Networks

    Literature survey:

    A mobile ad hoc network (MANET) is a dynamic wireless network

    that can be formed without any pre-existing infrastructure in which each node can act as a

    router. MANET has no clear line of defense, so, it is accessible to both legitimate networkusers and malicious attackers. In the presence of malicious nodes, one of the main

    challenges in MANET is to design the robust security solution that can protect MANET

    from various routing attacks. Different mechanisms have been proposed using variouscryptographic techniques to countermeasure the routing attacks against MANET. However,

    these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth

    and battery power, because they introduce heavy traffic load to exchange and verifyingkeys. In this paper, the current security issues in MANET are investigated. Particularly, we

    have examined different routing attacks, such as flooding, black hole, link spoofing,

    wormhole, and colluding miserly attacks, as well as existing solutions to protect MANETprotocols.

    In this paper, we have described the Flooding Attack, a novel and powerful attack against

    on demand ad hoc routing protocols. This attack allows attacker to mount a denial ofservice attack against all on-demand routing protocols for mobile ad hoc networks, even

    secure on-demand routing protocols. We design the Flooding Attack Prevention (FAP) to

    resisting this attack. The results of our implementation show the Flooding AttackPrevention efficiently defense the Ad Hoc Flooding Attack with little overload.

  • 7/31/2019 A New Routing Attack in Mobile Ad Hoc Networks

    2/4

    Existing system:

    DFD:

    Flooding attack

    Secured MANET

    Flooding attack

    FAP

    Attacker?

    Allow to communicate

    Neighbour nodes

    Isolate the attacker and

    break the link

    yes

    no

  • 7/31/2019 A New Routing Attack in Mobile Ad Hoc Networks

    3/4

    flow of project:

    1. MANET implementation

    2. Protocol implementation3. Flooding attack implementation4. FAP process

    MANET implementation:

    MANET implementation using several no. of nodes and madecommunication links among each node.

    Protocol implementation:

    Routing Protocols like AODV are implemented to enable routing andcommunication among MANET nodes and secure routing protocols are implemented.

    Flooding attack implementation:

    Implementation of flooding attack by assigning a node as an attacker node.

    FAP process:

    By using FAP, intruders are detected and isolated by its neighbors and links

    are deleted.

    System Specification:

    Hardware specification:

    Processor Type : Pentium IV

    Speed : 2.4GHZ

    Ram : 512 MB RAMHard disk : 20 GB HDD

    Software specification:

    Operating System : Red Hat LINUX. 9

    Package : ns-allinone2.34

    Language : TCL, C++

  • 7/31/2019 A New Routing Attack in Mobile Ad Hoc Networks

    4/4