Resisting flooding attacks on AODV

Mohamed A. Abdelshafy, Peter J B King

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

AODV is a reactive MANET routing protocol that is vulnerable to a dramatic collapse of throughput when malicious intruders flood the network with bogus route requests. We introduce a simple mechanism to resist such attacks that can be incorporated into any reactive routing protocol. It does not require expensive cryptography or authentication mechanisms, but relies on locally applied timers and thresholds to classify nodes as malicious. No modifications to the packet formats are needed, so the overhead is a small amount of calculation at nodes, and no extra communication. Using NS2 simulation, we compare the performance of networks using AODV under flooding attacks with and without our mechanism, showing that it significantly reduces the effect of a flooding attack.

Original languageEnglish
Title of host publicationSECURWARE 2014 - 8th International Conference on Emerging Security Information, Systems and Technologies
PublisherIARIA
Pages14-19
Number of pages6
Publication statusPublished - 2014
Event8th International Conference on Emerging Security Information, Systems and Technologies - Lisbon, United Kingdom
Duration: 16 Nov 201420 Nov 2014

Conference

Conference8th International Conference on Emerging Security Information, Systems and Technologies
Abbreviated titleSECURWARE 2014
CountryUnited Kingdom
CityLisbon
Period16/11/1420/11/14

Keywords

  • AODV
  • Attack
  • Flooding
  • MANET
  • Routing
  • Security

Fingerprint Dive into the research topics of 'Resisting flooding attacks on AODV'. Together they form a unique fingerprint.

  • Cite this

    Abdelshafy, M. A., & King, P. J. B. (2014). Resisting flooding attacks on AODV. In SECURWARE 2014 - 8th International Conference on Emerging Security Information, Systems and Technologies (pp. 14-19). IARIA.