2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC) 2015
DOI: 10.1109/ssic.2015.7245675
|View full text |Cite
|
Sign up to set email alerts
|

Flooding attacks detection in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The proposed method has provided less end-to-end delay times than [15,16]. The studies in the references [6,8] show a high similarity with the proposed method in terms of end-to-end delay times In Figure 6, the comparison of the dropped packets uses the proposed FA-AODV algorithm instead of the attacked AODV protocol, and results obtained are close to the AODV protocol which works in the non-attack scenario due to isolating the attacker nodes from the network. The increase in the number of packets dropped indicates that the attacker blocked the communication and caused a network blockage.…”
Section: Fa-aodv Algorithm Performance Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…The proposed method has provided less end-to-end delay times than [15,16]. The studies in the references [6,8] show a high similarity with the proposed method in terms of end-to-end delay times In Figure 6, the comparison of the dropped packets uses the proposed FA-AODV algorithm instead of the attacked AODV protocol, and results obtained are close to the AODV protocol which works in the non-attack scenario due to isolating the attacker nodes from the network. The increase in the number of packets dropped indicates that the attacker blocked the communication and caused a network blockage.…”
Section: Fa-aodv Algorithm Performance Analysismentioning
confidence: 99%
“…IP address spoofing creates offensive fake routing packets using addresses that are assigned to others or never assigned. Several security solutions have been proposed to solve various problems related to flood attacks in the VANETs [6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…The primary function of the network layer is routing [21]. In MANET most of the attacks are delivered after accessing the routing information [22].…”
Section: Network Layer Attacks On Aodvmentioning
confidence: 99%
“…M. Rmayti et al [15] developed a detection system for RREQ Flooding attack in MANET. The developed system has two components: anomaly notification procedure and Security and Communication Networks 5 malicious flooding detection mechanism.…”
Section: Related Workmentioning
confidence: 99%
“…The limitation in [8,12,13,17] is that an alarm message is broadcasted to normal nodes after the detection of an attacker node in the If the requesting node is in the suspicious list and it broadcasts requests for different IDs then add requester node ID to the black list If the requesting node is not in the suspicious list and it broadcasts requests for different IDs then add requester node ID to the suspicious list network, which makes the network vulnerable to a blackmail attack because a blackmail attacker node can broadcast false alarm messages containing normal nodes IDs to isolate them from other normal nodes in the network. The limitation in [15] is that the detection of an attacker node depends on the exchange of information about other nodes, which makes the network vulnerable to false information exchange by cooperative attacker nodes. The limitation in [11] is that the proposed model depends on clustering the network to detect the attacker node and it is known that clustering has a high overhead in MANET.…”
Section: Related Workmentioning
confidence: 99%