Novel Technique to Increase Security of Wireless Ad Hoc Networks

Sonali Sharma, Simranjit Kaur


The mobile ad hoc network is the decentralized and self-configuring type of network in which mobile nodes join or leave the network any time. Due to this, some malicious nodes enter the network, which are responsible to trigger various active and passive attacks. The flooding attack is the active type of attack in which malicious nodes send raw packets on the channel. Due to this, channel gets overload and packet loss may occur within the network. This leads to reduction in network throughput and increase network packet loss. In this research, the technique of monitor mode will be proposed which detects and isolates malicious nodes from the network which are responsible to trigger flooding attack.

Full Text:



Kashif Laeeq, Khalid Khan, “Performance Study of Approaches for Detecting Attacks in Ad Hoc Wireless Networks” Journal of Computing, Volume-3-Issue-2, pp.45-52, February-2011.

Kashif Laeeq, “Security Challenges & Prevention in Wireless Communication” International Journal of Scientific & Engineering Research, Volume 2, Issue 5, pp.1-8, May-2011.

W.Wang, Y.Lu and K.Bhargava, “On Vulnerability and Protection of Ad Hoc On Demand Distance Vector Protocol”, IEEE Proc. ICT, Vol.1, pp 357- 382, 2003.

N.Jaisankar and R.Saravanan, “An Extended AODV Protocol for Multipath Routing in MANETs”, IACSIT International Journal of Engineering and Technology, Vol.2, No.4, ISSN: 1793-8236, August 2010.

Yinghua Guo, Sylvie Perreau, “Trace Flooding Attack in Mobile Ad Hoc Networks” 1-4244-1502-0/07, 2007 IEEE, ISSNIP 2007.

Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao, “Performance Analysis of Flooding Attack Prevention Algorithm in MANETs”, World Academy of Science, Engineering and Technology 56 2009.

Pratik Gite, “Link Stability Prediction for Mobile Ad-hoc Network Route Stability”, International Conference on Inventive Systems and Control, vol. 14, pp. 22-45, 2017.

Dr.J. Vellingiri, Dr.K.Saravanan, “Defending MANET Against Flooding Attack for Medical Application”, 2nd International Conference on Communication and Electronics Systems (ICCES 2017), vol. 12, pp. 533-537, 2017.

Afroze Ansari, Dr.Mohammed Abdul Waheed, “Flooding Attack Detection and Prevention in MANET Based on Cross layer Link Quality Assessment”, International Conference on Intelligent Computing and Control Systems ICICCS, vol. 14, pp. 33-37, 2017,

Chanda Dhakad, Anand Singh Bisen, “Efficient Route Selection By Using Link Failure Factor In MANET”, International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), vol. 5, pp. 15-53, 2016

Sukiswo, Muhamad Rifqi Rifquddin, “Performance of AOMDV Routing Protocol Under Rushing and Flooding Attacks in MANET”, Proc. of20l5 2nd Int. Conference on Information Technology, Computer and Electrical Engineering (ICITACEE), vol. 4, pp. 386-390, 2015.

Khushboo Sawant, Manoj Kumar Rawat, Aakansha Jain, “Implementation of Energy Aware Secure Routing Protocol over Flooding Environment in MANET”, IEEE International Conference on Computer, Communication and Control (IC4-2015), vol. 4, pp. 809-814, 2015.



  • There are currently no refbacks.

© International Journals of Advanced Research in Computer Science and Software Engineering (IJARCSSE)| All Rights Reserved | Powered by Advance Academic Publisher.