An Efficient Secure Enhanced Routing Protocol for DDoS Attacks in MANET

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


In Mobile Ad Hoc NETwork (MANET), an attacker can easily make a server or a network resource unavailable to users by temporarily interrupting or suspending the services of a host connected to the Internet. So far, several secured routing protocols have been proposed for MANET. But all of them have certain disadvantages. Hence, security in MANET is still a challenging area. An Efficient Secure Enhanced Routing Protocol (ESERP) for MANET is proposed which is an attack resistant authentication mechanism. The problem definition is that the proposed protocol focuses on efficient security against protocol exploitation flooding attacks which is a part of Distributed Denial-of-Service (DDoS) attacks in MANET routing protocols. The ESERP protocol is used to address all the issues of protocol attacks in DDoS attacks in MANET for route establishment. The Protocol exploitation flooding attacks in DDoS includes SYN floods, fragmented packet attacks, Ping of Death, Smurf DDoS and more. Detailed simulation studies have confirmed the efficiency and effectiveness of ESERP
Copyright © 2014 Praise Worthy Prize - All rights reserved.


DDoS; ESERP; MANET; Routing Protocols; Security

Full Text:



Saman Taghavi Zargar, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks ", IEEE Communications Surveys & Tutorials, 2013.

Priyadharshini V and Kuppusamy K, "Prevention of DDOS Attacks using New Cracking Algorithm", International Journal of Engineering Research and Applications, Vol. 2, No. 3, pp.2263-2267, June 2012.

Rizwan Khan and A.K.Vatsa “Detection and Control of DDOS attacks over reputation and score based MANET” Journal of Emerging Trends in Computing and Information Sciences, Vol. 2, No. 11, October 2011.

Iftikhar Ahmad and Humaira Jabeen “Enhanced Load Balanced AODV Routing Protocol” International Journal of Computer Science and Information security, 9(1):98-101, 2011.

H. I. Liu, and K. C. Chang, “Defending systems Against Tilt DDoS attacks, Telecommunication Systems, Services, and Applications (TSSA)”, pp. 22 vol.27, October 20-21, 2011.

Rakesh Kumar, Manoj Misraand Anil Sarje, " A Simplified Analytical Model for End-To-End Delay Analysis in MANET ", International Journal of Computer Applications, Vol. 4, No. 6, pp. 195-199, 2010

Manoharan, R. and Ilavarasan, E. “Impact of Mobility on the Performance of Multicast Routing Protocols in MANET”, International Journal of Wireless and Mobile Networks, Vol.2, No.2, pp.110-119, 2010.

Shukla Ashish “On the Reduction of Broadcast Traffic in Mobile Ad Hoc Networks”, International Conference on Wireless Communications, Networking and Mobile Computing, pp.1581-1584, 2010.

Ming-Wei Xu, Qian Wu, Guo-liang and You-Jian Zhao“The impact of mobility models in mobile IP multicast research”, International Journal of Ad Hoc and Ubiquitous Computing, Vol.4, No.3, pp.191-200, 2009.

Mohd Izuan, Mohd Saad and Zuriati Ahmad Zukarnain “Performance Analysis of Random-Based Mobility Models in MANET Routing Protocol”, European Journal of Scientific Research, Vol.32, No.4, pp.444-454, 2009.

Fasheng Yi,, Shui Yu, Wanlei Zhou, Jing Hai and Alessio Bonti,”Source-Based Filtering Scheme against DDOS Attacks”, International Journal of Database Theory and Application, 2009.

I. Aad, J.P. Hubaux, E.W. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,” IEEE/ACM Transactions on Networking (TON), vol. 16 (4), pp. 791-802, 2008.

A.Patwardhan,J. Parker, M. Iorga, A. Joshi,T. Karygiannis and Y. Yesha, "Threshold-based intrusion detection in ad hoc networks and secure AODV", Vol.6, No.4, pp.578-599, 2008.

Liu, Kejun Deng, Jing Varshney, Pramod K. Balakrishnan, Kashyap “An Acknowledgment-based Approach for the Detection of Routing Misbehavior in MANETs” Mobile Computing, IEEE Transactions on May 2007.

Gergely Acs, Levente Buttyan and Istvan Vajda “Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol. 5, No. 11, pp. 1533-1546, 2006.

Abraham Yaar, Adrian Perrig and Dawn Song, “StackPi: New Packet Marking and Filtering Mechanisms for DDoS and IP Spoofing Defense”, IEEE Journal on Selected Areas in Communications, vol.24, no. 10, Oct. pp.1853-1863, 2006.

Paulo E. Ayres, Huizhong Sun, H. Jonathan Chao, Wing Cheong Lau, “ALPi: A DDoS Defense System for High-Speed Networks”, IEEE Journal On Selected Areas In Communications, vol. 24, no. 10, Oct, pp.1864-1876, 2006 .

Guangsen Zhang and Manish Parashar, "Cooperative Defence against DDOS attacks", Journal of Research and Practice in Information Technology, Vol. 38, No. 1, pp. 69-84, 2006.

Huaizhi Li and Mukesh Singhal, "A Secure Routing Protocol for Wireless Ad Hoc Networks", in proceedings of 39th Annual Hawaii International Conference on System Sciences, Vol.9, 2006.

T Nagarjuna, C.C. Kalyan Srinivas, K R Arjun Reddy, “Implementation of SAODV and TAODV Adhoc Secure Routing Protocols”, International Journal of Computer Science and Mobile Computing, Vol. 2, Issue. 7, July 2013, pg.427 – 433 34, no. 2, pp. 39-53, April 2004.

C. Douligeris, and A. Mitrokotsa, “DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks”, Vol.44, No. 5, pp. 643-666, April 2004.

S. Ranjan, R. Swaminathan, M. Uysal, and E. Knightly, “DDoS-Resilient Scheduling to Counter Application Layer Attacks under Imperfect Detection”, IEEE INFOCOM’06, 2006.

Xiaoqi Li ; Lyu, M.R. Jiangchuan Liu"A trust model based routing protocol for secure ad hoc networks “ Aerospace Conference, Proceedings.2004, IEEE Vol.2, Page(s): 1286 – 1295. DDoS attack-size-growing-dramati/240159399.

Eduardo da Silva, Renan Fischer e Silva, Luiz Carlos Pessoa Albini, Security Through Virtualization on Mobile Ad Hoc Networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.

Ambika, I., Eswaran, P., Improved token based resource allocation technique for multi-service flows in MANET, (2013) International Review on Computers and Software (IRECOS), 8 (6), pp. 1489-1496.

Kalaiarasi, R., Sridharan, D., Timeout misbehavior detection algorithm: A novel method for the detection of MANET misbehavior, (2013) International Review on Computers and Software (IRECOS), 8 (5), pp. 1091-1096.

Yan, G., Peng, Y., Huang, B., A hierarchical QoS routing algorithm based on VMN for MANET, (2013) International Review on Computers and Software (IRECOS), 8 (2), pp. 627-631.

Igni Sabasti Prabu, S., Jawahar Senthil Kumar, V., Entropy based approach to prevent the DDoS attacks for secured web services, (2013) International Review on Computers and Software (IRECOS), 8 (4), pp. 888-891.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2024 Praise Worthy Prize