Vous êtes sur la page 1sur 4

A New Routing Attack in Mobile Ad Hoc Networks

Literature survey:
A mobile ad hoc network (MANET) is a dynamic wireless network that can be formed without any pre-existing infrastructure in which each node can act as a router. MANET has no clear line of defense, so, it is accessible to both legitimate network users and malicious attackers. In the presence of malicious nodes, one of the main challenges in MANET is to design the robust security solution that can protect MANET from various routing attacks. Different mechanisms have been proposed using various cryptographic techniques to countermeasure the routing attacks against MANET. However, these mechanisms are not suitable for MANET resource constraints, i.e., limited bandwidth and battery power, because they introduce heavy traffic load to exchange and verifying keys. In this paper, the current security issues in MANET are investigated. Particularly, we have examined different routing attacks, such as flooding, black hole, link spoofing, wormhole, and colluding miserly attacks, as well as existing solutions to protect MANET protocols. In this paper, we have described the Flooding Attack, a novel and powerful attack against on demand ad hoc routing protocols. This attack allows attacker to mount a denial of service attack against all on-demand routing protocols for mobile ad hoc networks, even secure on-demand routing protocols. We design the Flooding Attack Prevention (FAP) to resisting this attack. The results of our implementation show the Flooding Attack Prevention efficiently defense the Ad Hoc Flooding Attack with little overload.

Existing system:

Secured MANET

Flooding attack

DFD:

Flooding attack

FAP yes Attacker? Neighbour nodes Isolate the attacker and break the link

no Allow to communicate

flow of project: 1. MANET implementation 2. Protocol implementation 3. Flooding attack implementation 4. FAP process MANET implementation:
MANET implementation using several no. of nodes and made communication links among each node.

Protocol implementation:
Routing Protocols like AODV are implemented to enable routing and communication among MANET nodes and secure routing protocols are implemented.

Flooding attack implementation:


Implementation of flooding attack by assigning a node as an attacker node.

FAP process:
By using FAP, intruders are detected and isolated by its neighbors and links are deleted.

System Specification:
Hardware specification: Processor Type Speed Ram Hard disk : : : : Pentium IV 2.4GHZ 512 MB RAM 20 GB HDD

Software specification: Operating System Package Language : : : Red Hat LINUX. 9 ns-allinone2.34 TCL, C++

Vous aimerez peut-être aussi