International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
|
Volume 5 - Issue 12 |
Published: August 2010 |
Authors: Sunita Sahu, Shishir K. Shandilya |
![]() |
Sunita Sahu, Shishir K. Shandilya . A Trust Based Security Scheme for RREQ Flooding Attack in MANET. International Journal of Computer Applications. 5, 12 (August 2010), 4-8. DOI=10.5120/964-1341
@article{ 10.5120/964-1341, author = { Sunita Sahu,Shishir K. Shandilya }, title = { A Trust Based Security Scheme for RREQ Flooding Attack in MANET }, journal = { International Journal of Computer Applications }, year = { 2010 }, volume = { 5 }, number = { 12 }, pages = { 4-8 }, doi = { 10.5120/964-1341 }, publisher = { Foundation of Computer Science (FCS), NY, USA } }
%0 Journal Article %D 2010 %A Sunita Sahu %A Shishir K. Shandilya %T A Trust Based Security Scheme for RREQ Flooding Attack in MANET%T %J International Journal of Computer Applications %V 5 %N 12 %P 4-8 %R 10.5120/964-1341 %I Foundation of Computer Science (FCS), NY, USA
Mobile ad hoc are gaining popularity because of availability of low cost mobile devices and its ability to provide instant wireless networking capabilities where implementation of wired network is not possible or costly. MANETs are vulnerable to various types of attack because of its features like continuous changing topology, resource constraints and unavailability of any centralized infrastructure. Many denial of service type of attacks are possible in the MANET and one of these type attack is flooding attack in which malicious node sends the useless packets to consume the valuable network resources. Flooding attack is possible in all most all on demand routing protocol. In this paper we present a novel technique to mitigate the effect of RREQ flooding attack in MANET using trust estimation function in DSR on demand routing protocol.