Loading

Secure and Efficient Location-Aided Routing Against DDOS Attack in Manet
H.J Shanthi11, E.A Mary Anita2

1H.J Shanthi1, , Assistant Professor, AMET Deemed to be University, Chennai, (Tamil Nadu), India.
2E.A Mary Anita, Professor, S.A.Engineering College, Chennai, (Tamil Nadu), India.

Manuscript received on 14 August 2019. | Revised Manuscript received on 20 August 2019. | Manuscript published on 30 September 2019. | PP: 4820-4829 | Volume-8 Issue-3 September 2019 | Retrieval Number: C6870098319/2019©BEIESP | DOI: 10.35940/ijrte.C6870.098319
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A wireless LAN is one in which a mobile user can connect to a local area network (LAN) through a wireless (radio) connection. There are many routing protocols used in wireless networks for transmission of message, among which, Location-Aided Routing (LAR) protocol is used to find the location of destination. This may be possible using Global Positioning System (GPS) in mobile. We concentrate on other malicious attacks that would have caused tremendous loss by impairing the functionalities of the computer networks. Denial of Service (DoS) and Distributed DoS (DDoS) attacks are two of the most harmful threats to the MANET functionality. From this point of view, LAR provides a solution against DoS and DDoS attacks. LAR does not have any security mechanism, so we propose a SE_LAR technique which includes traffic analysis methods and extended OEDA method. It is helpful to analyze the traffic, to detect an overwhelming traffic, legitimate nodes, congestion on network, and snooping attacks. Mobile Ad Hoc Network (MANET) is even more vulnerable to such attacks. So, in this paper, we propose Secure Location-Aided Routing (SE_LAR). Its results are compared with existing secure routing protocols like ISE_DREAM, SE_DREAM protocols. Using the existing SE_DREAM routing protocol malicious nodes are detected by traffic analysis process which is to monitor flooding impact on MANET. The OEDA method discriminates the attacker nodes from reputable nodes by evaluating the addresses in the response signal. But, it cannot be used for dense network, and cannot detect indirect Sybil attack. So, we introduce extended OEDA method with two schemes such as by refering cache memory of neighbor node scheme, and passive Sybil node identity detection, which is incorporated with SE_LAR routing protocol. OEDA method is currently incorporated with the SE_DREAM protocol, generally better known as ISE_DREAM, to produce the route to destination substantially more robust against DDOS attack. Finally we decide using the performance parameters to find out the best alternative among the three different routing protocols. Calculation of the performance of the computation compares SE_DREAM, ISE-DREAM and SE-LAR standards, the overall performance measurements by the NS2 simulator and using the parameters. To determine the effect of network size on the total performance of these protocols, we have three different phenomena.
Index Terms: Mobile Ad-Hoc Network (MANET), Denial of Service Attack (DoS), Distance Effect Routing Algorithm for Mobility, Distributed Denial of Service Attack (DDoS), SE-Location Aided Routing (LAR).

Scope of the Article:
Secure Mobile and Multi-Agent Systems