Abstract

In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations. Each node acts as an end node as well as a router for other nodes. A Mobile Ad-hoc Network (MANET) is based on self organizing, dynamic structure and freedom of mobility idea. The characteristics like dynamic structure, limited power, restricted bandwidth and continuously changing network routes makes MANET more vulnerable to the attacks and providing the security to it proves to be a challenging area. In this paper, we describe that how the flooding attack occur and the effect of flooding attack. Finally, we present simulation results to show the detrimental effects of Flooding Attack.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.