Abstract

The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.

Highlights

  • MANET (Mobile Adhoc Network) is the wireless Network

  • As the value of variance is calculated on the basis of the deviation of RREQs made by each node in the network, so this method of isolating malicious node is more efficient than other statistical and threshold based techniques used for detecting flooding attacker malicious nodes in MANET

  • We use AODV protocol in the NS simulator to check the performance of the purposed mechanism, The different parameters employ for simulation are show in the following table 1

Read more

Summary

Introduction

MANET (Mobile Adhoc Network) is the wireless Network. In Manet there is not fixed infrastructure all devices are used without any support of it. In Flooding attack an attacker use a high radio transmission range and processing power sends packets to a lot of Mobile Adhoc Network nodes which are dispersed in a large area within a Mobile Adhoc Network.[2]The flooding attack can be launched by an attacker node, but this attack causes the most damage to the MANET. This attack can be implemented by using the excess of RREQs (Route Requests) or data flooding. The motive of flooding attack is to degrade the performance of the network by exhausting various network resources

. Literature Review
Research Gaps
Algorithm
EXPERIMENTAL RESULTS AND PERFORMANCE ANALYSIS
Overhead
Throughput
Conclusion and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call