Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol

被引:0
|
作者
K. Geetha
N. Sreenath
机构
[1] Periyar Government Arts College,Department of Computer Science
[2] Pondicherry Engineering College,Department of Computer Science and Engineering
关键词
MANETS; Security; SYN flooding attacks; Game theory; QoS parameters;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile ad hoc networks (MANETs) play a vital role in ubiquitous computing. Multimedia communication is the main aspect of MANETs in emergency networks. Security is the major concern in such networks. MANETs are prone to many security problems because of their dynamic changing nature. One of the main attacks that affect any communication in a MANET is the denial-of-service attack. In this paper, such an attack called SYN flooding attack and its detection method are discussed. The presence of the SYN flooding attack in networks may not be identified correctly at an early stage. This leads to the denial of legitimate services at the multimedia server. An algorithm is presented in this paper to detect the presence of the SYN flooding attack at an early stage. The malicious node, instead of launching the SYN flooding attack, may try to delay the communication. This algorithm also finds such malicious nodes which try to affect the multimedia communication in MANETs by introducing unnecessary delays. The solution method involves game theory to form a game between the malicious node and the multimedia server node. The performance of the detection algorithm is verified by analyzing the various quality of service parameters relevant to multimedia communication.
引用
收藏
页码:1161 / 1172
页数:11
相关论文
共 50 条
  • [1] Detection of SYN Flooding Attack in Mobile Ad hoc Networks with AODV Protocol
    Geetha, K.
    Sreenath, N.
    [J]. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING, 2016, 41 (03) : 1161 - 1172
  • [2] Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc Networks
    Yerneni, Rajesh
    Sarje, Ani K.
    [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
  • [3] Trace flooding attack in mobile ad hoc networks
    Guo, Yinghua
    Perreau, Sylvie
    [J]. PROCEEDINGS OF THE 2007 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2007, : 329 - 334
  • [4] Performance Analysis of AODV Protocol in Mobile Ad Hoc Networks
    Ding, Yuanming
    Sun, Changhong
    Song, Lin
    Kong, Wanqi
    [J]. MEMS, NANO AND SMART SYSTEMS, PTS 1-6, 2012, 403-408 : 2415 - +
  • [5] A Mobile Ad Hoc Networks Algorithm Improved AODV Protocol
    Zhu Qiankun
    Xu Tingxue
    Zhou Hongqing
    Yang Chunying
    Li Tingjun
    [J]. PEEA 2011, 2011, 23
  • [6] A reverse AODV routing protocol in ad hoc mobile networks
    Kim, Chonggun
    Talipov, Elmurod
    Ahn, Byoungchul
    [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 522 - 531
  • [7] Interoperation between AODV Protocol and AOHR Protocol for Mobile Ad Hoc Networks
    Wu Shaochuan
    Wang Changhong
    Zhang Jiayan
    [J]. INTERNATIONAL CONFERENCE ON SPACE INFORMATION TECHNOLOGY 2009, 2010, 7651
  • [8] Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks
    Singh, Dilraj
    Singh, Amardeep
    [J]. FUTURE INTERNET, 2015, 7 (03): : 342 - 362
  • [9] Securing AODV Routing Protocol in Mobile Ad-Hoc Networks
    Phu, Phung Huu
    Yi, Myeongjae
    Kim, Myung-Kyun
    [J]. ACTIVE AND PROGRAMMABLE NETWORKS, 2009, 4388 : 182 - +
  • [10] A distributed protocol for detection of packet dropping attack in mobile ad hoc networks
    Sen, Jaydip
    Chandra, M. Girish
    Balamuralidhar, P.
    Harihara, S. G.
    Reddy, Harish
    [J]. ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2007, : 75 - 80