ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A SECURITY SCHEME BASED ON TRUST ATTACK IN MANET

Journal: International Journal of Advanced Research in Engineering and Technology (IJARET) (Vol.10, No. 2)

Publication Date:

Authors : ; ;

Page : 290-299

Keywords : Mobile Ad-hoc Networks; Denial of service; Flooding Attack.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Mobile ad hoc are gaining popularity because of availability of low-cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denials of service type of attacks are possible in the MANET and one of these type attacks is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol.

Last modified: 2019-05-07 20:33:59