Flooding attack and defence in Ad hoc networks

Ping Yi, Yafei Hou, Yiping Zhong, Shiyong Zhang, Zhoulin Dai

Research output: Contribution to journalArticlepeer-review

36 Citations (Scopus)

Abstract

Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack (AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.

Original languageEnglish
Pages (from-to)410-416
Number of pages7
JournalJournal of Systems Engineering and Electronics
Volume17
Issue number2
DOIs
Publication statusPublished - Jun 2006
Externally publishedYes

Keywords

  • Ad hoc flooding attack
  • Computer networks
  • Denial of service
  • Mobile Ad hoc networks
  • Routing protocol
  • Security

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Flooding attack and defence in Ad hoc networks'. Together they form a unique fingerprint.

Cite this