DOI QR코드

DOI QR Code

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

  • Received : 2010.08.06
  • Accepted : 2010.08.31
  • Published : 2011.03.31

Abstract

Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.

Keywords

References

  1. D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, Ad Hoc Networking, Chapter 5, Addison-Wesley, 2001, pp.139-172.
  2. Y.-C. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, Vol.2, No.3, 2004, pp.28-39.
  3. J. Li, D. Cordes, and J. Zhang, Power-Aware Routing Protocols in Ad Hoc wireless Networks, IEEE Wireless Communications, Vol.12, No.6, 2005, pp.69-81. https://doi.org/10.1109/MWC.2005.1561947
  4. M. Al-Shurman, S.-M. Yoo, and S. Park, Black Hole Attack in Mobile Ad Hoc Networks, the 42nd annual southeast regional conference, ACM Southeast Regional Conference, 2004, pp.96-97.
  5. Y.-C. Hu, A. Perrig, and D. B. Johnson, Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications, Vol.24, No.2, 2006, pp.370-380. https://doi.org/10.1109/JSAC.2005.861394
  6. P. Yi, Z. Dai, Y. Zhong, and S. Zhang, Resisting Flooding Attacks in Ad Hoc Networks, International Conference on Information Technology: Coding and Computing (ITCC 2005), Vol.2, 2005, pp.657-662.
  7. C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing, the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ‘99), 1999, pp.90-100.
  8. A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks, IEICE Transactions on Communications, Vol.E91-B, No.7, 2008, pp.2244-2254. https://doi.org/10.1093/ietcom/e91-b.7.2244
  9. B. A. Forouzan, Cryptography and Network Security, McGraw-Hill, 2008.
  10. B.-G. Chun and M. Baker, Evaluation of Packet Scheduling Algorithms in Mobile Ad Hoc Networks, ACM Mobile Computing and Communications Review (MC2R), Vol.6, No.3, 2002, pp.36-49. https://doi.org/10.1145/581291.581299
  11. R. Kumar, M. Misra, and A. K. Sarje, A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks, International Symposium on Ad Hoc and Ubiquitous Computing (ISAUHC '06), 2006, pp.13-18.
  12. S. Li, Q. Liu, H. Chen, and M. Tan, “A New Method to Resist Flooding Attacks in Ad Hoc Networks, International Conference on Wireless Communications”, Networking and Mobile Computing 2006 (WiCOM 2006), 2006, pp.1-4.
  13. Z. Y. Xia and J. Wang, DIMH: “A novel model to detect and isolate malicious hosts for mobile ad hoc network”, Elsevier Computer Standards & Interfaces, Vol.28, 2006, pp.660-669. https://doi.org/10.1016/j.csi.2005.08.002
  14. The VINT Project, The network simulator- ns-2, available at http://www.isi.edu/nsnam/ns/.

Cited by

  1. A novel user authentication scheme with anonymity for wireless communications 2012, https://doi.org/10.1002/sec.601
  2. Detecting SYN flooding attacks based on traffic prediction vol.5, pp.10, 2012, https://doi.org/10.1002/sec.428
  3. A novel intrusion detection framework for wireless sensor networks vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0529-y
  4. A collaborative routing protocol against routing disruptions in MANETs vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0537-y
  5. A Novel Solution to Handle DDOS Attack in MANET vol.04, pp.03, 2013, https://doi.org/10.4236/jis.2013.43019