scholarly journals Analysis of Denial of Service Attacks on Mobile Ad-Hoc Networks

2017 ◽  
Vol 9 (1) ◽  
pp. 12-16 ◽  
Author(s):  
Heshem A. El Zouka
2019 ◽  
Vol 8 (4) ◽  
pp. 9667-9674

For express employments of the mobile ad hoc networks (MANETs) sent during opponent conditions, unidentified correspondences through data overwhelm with expectedness is goliath. A fundamental thing is to give unidentifiability and unlinkability toward the mobile center obsessions as well as their techniques. The present protocol be weak against security dangers similar to if all else fails government administrator strikes, fake routing packs ambushes otherwise denial-of-service (DoS) broad-tossing assault, transfer examination strikes as well as insider strikes. During this document we suggest another routing protocol which is an improvement of the present protocol Authenticated Anonymous Secure Routing (AASR) protocol. AASR secures the strikes and outfits adequate nonattendance of clearness with the help of get-together signature and key mixed onion routing. In this work a bound together trust the board plan has been hardened with AASR protocol in order to upgrade the routing and data security in MANETs. Beguilement consequences contain shown the adequacy of the planned protocol through enhanced execution to the degree throughput, bunch got degree, pack adversity degree and surrender when ascended out of the present ones.


2012 ◽  
Vol 3 (3) ◽  
pp. 57-70 ◽  
Author(s):  
Raees Khan ShahSani ◽  
Muhammad Bakhsh ◽  
Amjad Mahmood

With the emergence of mobile ad-hoc networks, more users desire connectivity regardless of geographic location. MANETs are a promising technology in terms of the applications in the military, emergency situations, and general daily life activities. Various protocols have been developed to handle the routing information in such networks. However, most protocols are vulnerable to various threats. Among them, the Black-hole type of denial-of-service attack causes a major degradation in the performance and trust of the network nodes. In this paper, the authors review and highlight the limitations of the existing solutions and propose a new algorithm to handle the black-hole attacks. The proposed algorithm is comparatively efficient and easy to implement for detecting and avoiding the black-hole attacks. The proposed algorithm has been implemented in Network Simulator (ns-2) to evaluate its performance in term of packet delivery ratio, network load, and end-to-end delay. The simulation results show that the proposed algorithm achieves a considerable enhancement in the overall networking performance and avoids the black-hole attack successfully.


Sign in / Sign up

Export Citation Format

Share Document