Abstract

MANET (Mobile ad-hoc network) is particularly vulnerable due to its fundamental characteristics, such as open medium, dynamic topology, frequent route updation, distributed cooperation, and constrained capability. Any node with in the network can perform malicious activities. Mobile ad-hoc networks are particularly vulnerable to denial of service (DOS) attacks launched through compromised nodes or intruders. In this research work I have presented a distributed dynamically configurable firewall architecture that uses the ingress and aggress filtering to resist the DOS (i.e. data flooding attack). In DOS attacks attacker tries to make a connection for a long to disturb the network with its malicious activities. The firewall architecture performs some checks and tries to restrict the malicious user to disturb the network. When the intruder sends many attacking DATA packets to the victim node firewall detects the intruder node and after that, intruder will be restricted by the firewall module for some specified time. When a node is declared as black list user MPR exchanges the black list with other MPRs. Entries in the firewall table are maintained at run time.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.