Académique Documents
Professionnel Documents
Culture Documents
Literature survey:
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, black hole, link spoofing, wormhole, and colluding miserly attacks, as well as existing solutions to protect MANET protocols. In this paper, we have described the Flooding Attack, a novel and powerful attack against on demand ad hoc routing protocols. This attack allows attacker to mount a denial of service attack against all on-demand routing protocols for mobile ad hoc networks, even secure on-demand routing protocols. We design the Flooding Attack Prevention (FAP) to resisting this attack. The results of our implementation show the Flooding Attack Prevention efficiently defense the Ad Hoc Flooding Attack with little overload.
Existing system:
Secured MANET
Flooding attack
DFD:
Flooding attack
FAP yes Attacker? Neighbour nodes Isolate the attacker and break the link
no Allow to communicate
flow of project: 1. MANET implementation 2. Protocol implementation 3. Flooding attack implementation 4. FAP process MANET implementation:
MANET implementation using several no. of nodes and made communication links among each node.
Protocol implementation:
Routing Protocols like AODV are implemented to enable routing and communication among MANET nodes and secure routing protocols are implemented.
FAP process:
By using FAP, intruders are detected and isolated by its neighbors and links are deleted.
System Specification:
Hardware specification: Processor Type Speed Ram Hard disk : : : : Pentium IV 2.4GHZ 512 MB RAM 20 GB HDD
Software specification: Operating System Package Language : : : Red Hat LINUX. 9 ns-allinone2.34 TCL, C++