Visible to the public Anatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs

TitleAnatomization of Detection and Performance Measures Techniques for Flooding Attacks using Routing Protocols in MANETs
Publication TypeConference Paper
Year of Publication2019
AuthorsMintu, Singh, Gursharan, Malhi, Simarjit Singh, Mahajan, Makul, Batra, Salil, Bath, Ranbir Singh
Conference Name2019 International Conference on Automation, Computational and Technology Management (ICACTM)
Date Publishedapr
KeywordsAd hoc networks, Automation, compositionality, decentralized validation, detection anatomization, Dynamic attack, Flooding Attacks, inactive attack, MANET Attack Detection, MANETs, MANETSs, Metrics, mobile ad hoc networks, mobile ad-hoc network, mobile computing, mobile hubs, network parameters, Packet loss, performance measure techniques, portable hubs, pubcrawl, resilience, Resiliency, Routing protocols, security, security attack, Technology management, telecommunication security
AbstractMobile ad-hoc network (MANETS) is generally appropriate in different territories like military tactical network, educational, home and entertainment and emergency operations etc. The MANETSs are simply the disintegration and designing kind of system in this portable hubs coming up and out the system whenever. Because of decentralized creation of the network, security, routing and Standard of service are the three noteworthy issues. MANETSs are helpless against security attack in light of the decentralized validation. The mobile hubs can enter or out the system and at some point malicious hubs enter the system, which are capable to trigger different dynamic and inactive attack. The flooding attack is the dynamic sort of attack in which malicious hubs transfers flooding packets on the medium. Because of this, medium gets over-burden and packets drop may happen inside the system. This decreases the throughput and increased packet loss. In this paper we illustrated different techniques and proposed various methods responsible for flooding attack. Our commitment in this paper is that we have investigated various flooding attacks in MANETs, their detection techniques with performance measure parameters.
DOI10.1109/ICACTM.2019.8776694
Citation Keymintu_anatomization_2019