Abstract

In this Paper, two types of denial of service attac ks over mobile ad hoc networks are implemented and their impact is analyzed on data communication process when using a reactive ro uting protocol for data communication. The reactive routing protocol well known Ad-hoc on-demand distance vector (AODV) routi ng protocol. In the Implemented attacks, a maliciou s node i.e., attacker will drop data packets that it receives for forwarding t owards the destination of the packet. The attacker can do the attack by either making itself one of the intermediate nodes on the active route. The attackers can be one of the inter mediate nodes in two ways. In the first method the attacker is waiting that some rout e discovery process will select it as one of its intermediate node and then it will drop all the data packets it receives for forwarding to destination. In the second method the attacker uses the dissemination of the false information to become the part of an active route. Due to the wrong information spread by the malicio us nodes the routing tables of the source node enters a route for the destination that will surely includes the attacker in the route . The Implemented attack is simulated using a tool Exata and results are drawn using graphs to show the impact of the attack on da ta communication. Finally, a mechanism is proposed through which both the attack and attackers can be detected during the data comm unication and can be avoided in further communication process.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.