2019
DOI: 10.1155/2019/8249108
|View full text |Cite
|
Sign up to set email alerts
|

Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)

Abstract: Security in MANET is an essential task in preventing the harm that could be caused by malicious nodes in the network. Flooding attack is one of DoS attacks that aim to exhaust the network resources by flooding the network with a lot of fake packets and messages. There are different forms of Flooding attacks, and the most common form is the request one. Request Flooding attack keeps flooding the network with a lot of requests to the fake nodes that do not exist in the network. In this research, we presented a n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
10

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(7 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…There may be four reasons for the low Invulnerability of the network. [20] The first is that the AODV routing protocol fails to transmit network information due to the damage of the communication link in the node failure scenario. Second, the existing AODV multipath routing protocol node load balancing mechanism is not perfect.…”
Section: Improved Md_ Aodv Multipath Routing Protocol 41 Improvement ...mentioning
confidence: 99%
“…There may be four reasons for the low Invulnerability of the network. [20] The first is that the AODV routing protocol fails to transmit network information due to the damage of the communication link in the node failure scenario. Second, the existing AODV multipath routing protocol node load balancing mechanism is not perfect.…”
Section: Improved Md_ Aodv Multipath Routing Protocol 41 Improvement ...mentioning
confidence: 99%
“…Blackmail attack: In the blackmail attack, a compromised node eliminates a legitimate node from the network by proclaiming that the legitimate node is a malicious node. If a compromised node is able to block a large number of nodes, the network will become unstable [ 142 , 143 ].…”
Section: Devices’ Vulnerabilities and Requirementsmentioning
confidence: 99%
“…MANETs permit mobile devices to communicate altogether over a network through infrastructure-less or a decentralized authority [30] [31]. In MANETs, nodes can enter or exit the network at any time, resulting in dynamic topologies [32] [33]. MANETs are in danger of various malicious assaults, necessitating the use of a security design approach.…”
Section: Related Workmentioning
confidence: 99%