ISSN ONLINE(2278-8875) PRINT (2320-3765)

All submissions of the EM system will be redirected to Online Manuscript Submission System. Authors are requested to submit articles directly to Online Manuscript Submission System of respective journal.

Research Article Open Access

Performance Evaluation of UHCF Using TTL Probing for Packet Spoofing Detection in MANET

Abstract

Now days various types of network came into existence which supports medium based communication such as wired and wireless. Among them the network which works for temporary basis and gets disconnected after the time limit or connection expires. Ad hoc network supports short durational connection between movable nodes and gets terminated after the communication is over. Mobile ad-hoc network is one of the ad-hoc network having movable nodes communicating with the help of mobility aware routing protocols without any infrastructural elements such as router or switches. Here the mobile nodes itself serves the functionality of router. These network support dynamic environment and sudden changes which causes various unauthenticated devices and services starts operating in normal environment. It causes degradation in normal performance of the network and their behaviour changes as planned by these attacks. IP Spoofing is known as one of these attack in which the normal packets is gets changed or affected by some attacker’s packet in network. Quantity of this spoofed packet somewhere had been lost in normal traffic and the detection methodologies needs to make a clear separation between normal and spoofed traffic. The above functionality is achieved by some traditional methods works on the concept of Hop Count Filter (HCF) mechanism. But the traditional HCF method only measures the TTL maximum up to 30 hops limit and the packet coming from larger hops will be taken to be spoofed but it was not the case all the time. Sometimes actual packet might come from more hops. Its solution is been drafted as UHCF (Updated Hop Count Filtering) mechanism suggested in [19]. Along with some modification this paper presents a complete evaluation of suggested approach and will also presents a comparison of the approach with existing mechanisms.

Govind M. Poddar, Nitesh Rastogi

To read the full article Download Full Article | Visit Full Article