Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
Resisting Flooding Attacks in Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
Intrusion detection in wireless ad hoc networks
IEEE Wireless Communications
Dynamic names and private address maps: complete self-configuration for MANETs
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Hi-index | 0.00 |
A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations Each node acts as an end node as well as a router for other nodes There are generally two types of ad hoc routing protocols, reactive and proactive routing protocols The focus of this paper centers on reactive routing protocols which establish routes between communicating nodes when needed using a route discovery process involving Route Requests and Route Replies, a process which can be easily misused for denial-of-service attacks In this paper, we will describe one such attack, the Route Request Flooding Attack (RRFA) targeted at reactive routing protocols used in mobile ad hoc networks Then, we propose the Route Request Flooding Defence (RRFD) mechanism that is designed to reduce the impact of RRFA Finally, we present simulation results to show the detrimental effects of RRFA and the effectiveness of RRFD.