Abstract
Mobile ad hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this paper, we present a new DOS attack and its defense in ad hoc networks. The new DOS attack, called Ad hoc Flooding Attack (AHFA), is that intruder broadcasts mass Route Request packets to exhaust the communication bandwidth and node resource so that the valid communication can not be kept After analyzed Ad hoc Flooding Attack, we develop Flooding Attack Prevention (FAP), a generic defense against the Ad hoc Flooding Attack When the intruder broadcasts exceeding packets of Route Request, the immediate neighbors of the intruder record the rate of Route Request Once the threshold is exceeded, nodes deny any future request packets from the intruder. The results of our implementation show FAP can prevent the Ad hoc Flooding attack efficiently.
Original language | English |
---|---|
Pages (from-to) | 410-416 |
Number of pages | 7 |
Journal | Journal of Systems Engineering and Electronics |
Volume | 17 |
Issue number | 2 |
DOIs | |
Publication status | Published - Jun 2006 |
Externally published | Yes |
Keywords
- Ad hoc flooding attack
- Computer networks
- Denial of service
- Mobile Ad hoc networks
- Routing protocol
- Security
ASJC Scopus subject areas
- Control and Systems Engineering
- Computer Science Applications
- Electrical and Electronic Engineering