{"title":"Distributed detection of packet flooding in infrastructureless wireless network - an adaptive approach","authors":"Malvika Bahl, Rajni Bhoomarker, S. Zafar","doi":"10.1109/ICAETR.2014.7012833","DOIUrl":null,"url":null,"abstract":"The nodes in wireless networks without infrastructure have a limited range and they collaborate with their adjacent nodes to transmit packets which are destined out of their scope. Nodes use a trust based transmission method based on previous records of successful packet transmission. Nodes which violate this relay of packets and cause denial of service attack in the form flooding of large packets may cause congestion which needs to be detected. Whenever congestion occurs then the senders should lower their transmission rate, but if certain senders do not do this, it can be found by the destination by comparing it with the previous sending rate. When both the rates are equal, the corresponding sender is considered as an attacker and has to be removed from the existing path. Such type of node is continuously sending the control and data packets in the network, hindering the connection establishment. An adaptive approach is proposed which involves taking an alternate path to the destination which is less congested in order to complete the message transfer.","PeriodicalId":196504,"journal":{"name":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 International Conference on Advances in Engineering & Technology Research (ICAETR - 2014)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAETR.2014.7012833","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The nodes in wireless networks without infrastructure have a limited range and they collaborate with their adjacent nodes to transmit packets which are destined out of their scope. Nodes use a trust based transmission method based on previous records of successful packet transmission. Nodes which violate this relay of packets and cause denial of service attack in the form flooding of large packets may cause congestion which needs to be detected. Whenever congestion occurs then the senders should lower their transmission rate, but if certain senders do not do this, it can be found by the destination by comparing it with the previous sending rate. When both the rates are equal, the corresponding sender is considered as an attacker and has to be removed from the existing path. Such type of node is continuously sending the control and data packets in the network, hindering the connection establishment. An adaptive approach is proposed which involves taking an alternate path to the destination which is less congested in order to complete the message transfer.