RREQ flood attack and its mitigation in ad hoc network

7Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

RREQ Flood Attack is one of the prominent attack in Wireless Adhoc Network. In the flood attack, a malicious node fills up all the routing tables with its own packets and hence communication between source and destination becomes paralyzed. To secure against flooding attack, a mitigation scheme is proposed which uses Time to Live value to mark and remove the malicious node that floods the network. In the proposed scheme, RREQ limit is set which is dynamically checked after certain period so that the flood attack does not occur. The Simulation of the proposed scheme is done by Qualnet and the result shows that the scheme prevents the flooding attack, reduces the end-to-end delay and increases the throughput.

Cite

CITATION STYLE

APA

Rani, S., Narwal, B., & Mohapatra, A. K. (2018). RREQ flood attack and its mitigation in ad hoc network. In Communications in Computer and Information Science (Vol. 799, pp. 599–607). Springer Verlag. https://doi.org/10.1007/978-981-10-8527-7_50

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free