M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014
Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
The prominence of the place of wireless ad-hoc networking is become more crucial to everyday functioning of people. This is due to obvious advantages of wireless networks with ubiquity access and minimal hardware requirements in networks. The Adhoc nature of sensor networks means no structure can be strictly defined. The network topology is always subject to change due to node failure, addition or mobility. Since nodes may fail or be replaced the network must support self-configuration. Routing and data forwarding is a crucial service for enabling communication in sensor networks. Unfortunately, current routing protocols suffer from many security vulnerabilities. The simple attacks are involves injecting malicious routing information into the network, resulting in routing inconsistencies. Simplest authentication might guard against injection attacks, but some routing protocols are susceptible to reply by attacker of legitimate routing messages. Secure delivery of packets to and from the wireless networks is however a major issue in wireless networks. Low power wireless networks are an existing research direction in routing and packet forwarding. In this paper prior security works in this research direction in routing and packet forwarding. In this paper prior security work in this area focused primarily on routing layer exhaustion attacks. We design a novel routing protocol as SRPF. In this protocol we shown energy consumption monitoring algorithm (ECMA) to bounds the damage caused by source routing attacks during the packet forwarding phase.
Keywords: ad-hoc networking, energy consumption, vulnerability, source routing, security
Edition: Volume 3 Issue 9, September 2014
Pages: 842 - 845
How to Cite this Article?
Srihari Babu Kolla, B. B. K. Prasad, "Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP14339, Volume 3 Issue 9, September 2014, 842 - 845
105 PDF Views | 74 PDF Downloads
Similar Articles with Keyword 'energy consumption'
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Review Papers, Computer Science & Engineering, India, Volume 10 Issue 1, January 2021
Pages: 594 - 596A Review of Replication Strategies to Increase Data Availability for Data Intensive Applications in Cloud
K. Sreelatha
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 1450 - 1456An Aerial View of Hierarchical Energy Efficient Protocols in Wireless Body Sensor Networks
M. Devapriya, R. Sudha
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1742 - 1745Enhancement of Leach Protocol in Wireless Sensor Network
Bipin Patel, Hardik Kadiya
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Similar Articles with Keyword 'vulnerability'
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Review Papers, Computer Science & Engineering, India, Volume 5 Issue 2, February 2016
Pages: 61 - 64Clients Location Hiding in Geosocial Recommendation Applications
Khadke Shriram Bhanudasrao, Mahadik Pravin B.
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014
Pages: 1536 - 1540Enterprise Software Management Systems by Using Security Metrics
Bhanudas S. Panchabhai, A. N. Patil
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 1416 - 1420Mitigation of CSRF Attack
Nikunj Tandel, Kalpesh Patel
Similar Articles with Keyword 'source routing'
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 842 - 845Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
Srihari Babu Kolla, B. B. K. Prasad
Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 326 - 329Quality of Service in Wireless Networks using Weighted Clustering Algorithm
M. Anil Kumar, V. Srikanth, N. Vijaya Gopal
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 9, September 2015
Pages: 1148 - 1153ECBDS: Enhanced Cooperative Bait Detection Scheme for Preventing Collaborative Attacks in MANETS
Abdul Jawad PP, Bismin Chacko
Informative Article, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2169 - 2172Spotting and Segregation of Sinkhole Node in MANET
Jeeja Borkar, Vaishali Malekar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1572 - 1577Analysis of Various Malicious Node Detection Techniques: A Review
Priyanka, Mukesh Dalal
Similar Articles with Keyword 'security'
Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 890 - 894A Survey on Types of Crawlers and Web Searching Algorithms
T. Yogameera, Dr. D. Shanthi
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2406 - 2408Optimizing the Ad-Hoc Applications in Vehicular Network: A Study
Sumeet Sekhon, Dinesh Kumar
Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020
Pages: 1544 - 1554Recent Developments on Probabilistic Graphical Model Applied in Data Analysis
Kan'Sam Nadjak, Guisheng Yin