Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 102 | Views: 258

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 7 / 10


     

Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks

Srihari Babu Kolla, B. B. K. Prasad


Abstract: The prominence of the place of wireless ad-hoc networking is become more crucial to everyday functioning of people. This is due to obvious advantages of wireless networks with ubiquity access and minimal hardware requirements in networks. The Adhoc nature of sensor networks means no structure can be strictly defined. The network topology is always subject to change due to node failure, addition or mobility. Since nodes may fail or be replaced the network must support self-configuration. Routing and data forwarding is a crucial service for enabling communication in sensor networks. Unfortunately, current routing protocols suffer from many security vulnerabilities. The simple attacks are involves injecting malicious routing information into the network, resulting in routing inconsistencies. Simplest authentication might guard against injection attacks, but some routing protocols are susceptible to reply by attacker of legitimate routing messages. Secure delivery of packets to and from the wireless networks is however a major issue in wireless networks. Low power wireless networks are an existing research direction in routing and packet forwarding. In this paper prior security works in this research direction in routing and packet forwarding. In this paper prior security work in this area focused primarily on routing layer exhaustion attacks. We design a novel routing protocol as SRPF. In this protocol we shown energy consumption monitoring algorithm (ECMA) to bounds the damage caused by source routing attacks during the packet forwarding phase.


Keywords: ad-hoc networking, energy consumption, vulnerability, source routing, security


Edition: Volume 3 Issue 9, September 2014


Pages: 842 - 845



Make Sure to Disable the Pop-Up Blocker of Web Browser


Text copied to Clipboard!
Srihari Babu Kolla, B. B. K. Prasad, "Defending Against Source Routing Attacks in Wireless Ad-Hoc Networks", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 842-845, https://www.ijsr.net/getabstract.php?paperid=SEP14339, DOI: https://www.doi.org/10.21275/SEP14339

Similar Articles

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 138 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article

Downloads: 0

Research Paper, Computer Science & Engineering, India, Volume 11 Issue 11, November 2022

Pages: 642 - 647

Face Liveness to Identify Between Actual Face and Spoof Face

Lovely Pal, Renuka Singh

Share this Article
Top