Skip to main content

RREQ Flood Attack and Its Mitigation in Ad Hoc Network

  • Conference paper
  • First Online:
Data Science and Analytics (REDSET 2017)

Abstract

RREQ Flood Attack is one of the prominent attack in Wireless Adhoc Network. In the flood attack, a malicious node fills up all the routing tables with its own packets and hence communication between source and destination becomes paralyzed. To secure against flooding attack, a mitigation scheme is proposed which uses Time to Live value to mark and remove the malicious node that floods the network. In the proposed scheme, RREQ limit is set which is dynamically checked after certain period so that the flood attack does not occur. The Simulation of the proposed scheme is done by Qualnet and the result shows that the scheme prevents the flooding attack, reduces the end-to-end delay and increases the throughput.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Balakrishnan, V., Varadhrajan, V., Tupakula, U.: Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications. In: Wireless Broadband and Ultra Wideband Communications, vol. 2, p. 29 (2007)

    Google Scholar 

  2. Bandyopadhyay, A., Vuppala, S., Choudhury, P.: A simulation analysis of flooding attack in MANET using NS-3. In: Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), pp. 1–5 (2011)

    Google Scholar 

  3. Chauhan, N., Yadav, S.: Flooding attacks prevention in MANET. Int. J. Comput. Technol. Electron. Eng. 1(3), 68–72 (2011)

    Google Scholar 

  4. Choudhury, P., Nandi, S., Paul, A., Debnath, N.: Mitigating route request flooding attack in MANET using node reputation. In: IEEE 10th International Conference on Industrial Informatics, vol. 10, pp. 1010–1015 (2012)

    Google Scholar 

  5. Guo, Y., Perreau, S.: Trace flooding attack in mobile ad hoc networks. In: International Conference on Intelligent Sensors, Sensors Networks and Information, vol. 3, pp. 329–334 (2007)

    Google Scholar 

  6. Kum, D., Le, A., Cho, Y., Toh, C., Lee, I.: An efficient on-demand routing approach with directional flooding for wireless mesh networks. J. Commun. Netw. 2(1), 67–73 (2010)

    Article  Google Scholar 

  7. Li, M., Li, J.: Simulation study of flood attacking of DDOS. In: International Conference on Internet Computing in Science and Engineering, pp. 286–293 (2008)

    Google Scholar 

  8. Pires, W., Figueiredo, T., Wong, H., Loureiro, A.: Malicious node detection in wireless sensor networks. In: Proceedings of the 18th International Parallel and Distributed Processing Symposium, vol. 18, p. 24 (2004)

    Google Scholar 

  9. Song, J., Hong, F., Zhang, Y.: Effective filtering scheme against RREQ flooding attack in mobile ad hoc networks. In: Proceedings of the 7th International Conference on Parallel and Distributed Computing, Applications and Technologies, vol. 7, pp. 497–502 (2006)

    Google Scholar 

  10. Venkatraman, R., Pushpalatha, M., RamaRao, T.: Performance analysis of flooding attack, prevention algorithm in MANETs. Int. J. Comput. Electr. Autom. Control Inf. Eng. 3(8), 2056–2059 (2009)

    Google Scholar 

  11. Yi, P., Dai, Z., Zhong, Y., Zhang, Z.: Resisting flooding attacks in ad hoc networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC 2005), vol. 2, pp. 657–662 (2005)

    Google Scholar 

  12. RFC 3561 of AODV protocol

    Google Scholar 

  13. www.Qualnet/6.1/documentation

  14. Grover, N., Mohapatra, A.K.: Digital image authentication model based on edge adaptive steganography. In: Proceedings of the 2013 2nd International Conference on Advanced Computing, Networking and Security, pp. 238–242. IEEE Computer Society, December 2013

    Google Scholar 

  15. Khandelwal, A., Mohapatra, A.K.: An insight into the security issues and their solutions for android phones. In: 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bhawna Narwal .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rani, S., Narwal, B., Mohapatra, A.K. (2018). RREQ Flood Attack and Its Mitigation in Ad Hoc Network. In: Panda, B., Sharma, S., Roy, N. (eds) Data Science and Analytics. REDSET 2017. Communications in Computer and Information Science, vol 799. Springer, Singapore. https://doi.org/10.1007/978-981-10-8527-7_50

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8527-7_50

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8526-0

  • Online ISBN: 978-981-10-8527-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics