Introduction to Rushing Attack on Network Node Project:

With the main applications in the field s like military and secured data communication, a modern day design of mobile nodes communicating with each other with no substructure is known as a mobile ad hoc network (MANET). 


It is used in streaming videos. Single packets of data are moved by network and sent to the subset of network addresses. The multicast is preferred over many unicast transmissions because it saves bandwidth and resource. Wireless transmission is more prone to attack where the data can be traced from licentious mode. 

Rushing attack

Here the data is captured by utilizing the duplicate suppression mechanism and immediately gaining access to forwarding group. 

Impact of rushing attack

The protocols say that the nodes must only forward the first request received and the other requests coming at that time are ignored. The rushing attack acts as a denial of service attack against all networking protocols where attacking node is placed at the sender, receiver and anywhere in the network. Similarly the performance attack success rate can be calculated. 

Impact of rushing attack 

A graphical analysis is obtained when the rushing attack happens near the sender. In case of no rushing attack in the network will lead to average attack success rate to be least.  Similarly analysis can be obtained for the rushing attack near the receiver. The probability of getting the packet depends on the upcoming node when the rushing node is placed anywhere. 


The current system is designed for a single sender and multiple receivers which seem to be enhancing in future by having multiple senders and multiple receivers. 


The rushing attack on network node is likely to succeed while having multiple senders. The motive of this project would be draw a graph based on rushing attack position of network. 

Download  Rushing Attack on Network Node CSE Project Report .