Loading

An Improved Detection and Prevention Method for Defending Packet Drop and DOS Attacks in Mobile Adhoc Networks
Kamlesh Patel1, Abhishek Thoke2

1Kamlesh Patel, Scholar, Department of Information Technology, Technocrat Institute of Technology, Bhopal (M.P), India.
2Abhishek Thoke, Assistant Professor, Department of Information Technology, Technocrat Institute of Technology, Bhopal (M.P), India.

Manuscript received on 13 June 2016 | Revised Manuscript received on 20 June 2016 | Manuscript Published on 30 June 2016 | PP: 170-176 | Volume-5 Issue-5, June 2016 | Retrieval Number: E4646065516/16©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In recent year with the widespread use of mobile device, Mobile Ad hoc networks (MANETs) technology has been attracted attention day by day. Specially, MANETs suit for military operations and the emergent disasters rescue that need to overcome terrain and special purpose in urgent. The fact that mobile ad-hoc networks lack fixed infrastructure and use wireless link for communication makes them very susceptible to an adversary’s malicious attacks. Black hole attack is one of the severe security threats in ad-hoc networks which can be easily employed by exploiting vulnerability of on-demand routing protocols such as AOMDV. Furthermore, DOS attack is a fairly new type of attack to cripple the availability of Internet services and resources. A DOS attack can originate from anywhere in the network and typically overwhelms the victim server by sending a huge number of packets. In this paper, we have proposed a solution based on malicious detection and prevention method to defend black hole and DOS attacks imposed by both single and multiple nodes. Result of a simulation study proves the particular solution maximizes network performance by minimizing generation of control (routing) packets. The effectiveness of our mechanism is illustrated by simulations conducted using network simulator ns-2.
Keywords: AOMDV, Routing Protocol, Black-hole, DOS, Communication, Network Simulator

Scope of the Article: WSN