•  
  •  
 

International Journal of Smart Sensor and Adhoc Network

Abstract

In recent years, the use of mobile ad hoc networks (MANETs) has been widespread in many applications, including some mission critical applications, and as such security has become one of the major concerns in MANETs. A mobile ad hoc network is set up with a group of mobile wireless nodes without the use of any dedicated routers or base stations. Each node acts as an end node as well as a router for other nodes. A Mobile Ad-hoc Network (MANET) is based on self organizing, dynamic structure and freedom of mobility idea. The characteristics like dynamic structure, limited power, restricted bandwidth and continuously changing network routes makes MANET more vulnerable to the attacks and providing the security to it proves to be a challenging area.In this paper,we describe that how the flooding attack occur and the effect of flooding attack. Finally, we present simulation results to show the detrimental effects of Flooding Attack.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.