International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 121 | Views: 225

Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.2 / 10


     

Study of Detection and Prevention Techniques for Flooding attack on AODV in MANET

Shruti Bhalodiya, Krunal Vaghela


Abstract: Mobile means moving and ad hoc means temporary without any fixed infrastructure. Hence, mobile ad hoc network is a temporary network in which nodes are moving without any fixed infrastructure or centralized administration. MANETs are vulnerable to security attacks because of the decentralized authentication. Black hole, gray hole, worm hole, flooding are such type of security threats that affects the network. This paper presents a review on MANET, AODV routing protocol, flooding attack and comparison of various detection and prevention techniques of flooding attack. Among all this techniques, RFAP technique can easily find the attacker node and protect the network from RREQ flooding attack.


Keywords: MANET, AODV routing protocol, Security attacks


Edition: Volume 4 Issue 1, January 2015


Pages: 433 - 436



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Shruti Bhalodiya, Krunal Vaghela, "Study of Detection and Prevention Techniques for Flooding attack on AODV in MANET", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 433-436, https://www.ijsr.net/getabstract.php?paperid=SUB15153

Similar Articles

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2406 - 2408

Optimizing the Ad-Hoc Applications in Vehicular Network: A Study

Sumeet Sekhon, Dinesh Kumar

Share this Article

Downloads: 9 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 2, February 2024

Pages: 736 - 741

Energy Efficient Routing Algorithm for Future Ad-hoc Wireless Networks

Dr. J. Seetaram, Dr. M. Nagaraju Naik

Share this Article

Downloads: 80

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 2450 - 2452

A Review of Random Based Mobility Model for AODV and DSDV MANETs Routing Protocols

Sunita, Sunil Makkar

Share this Article
Top