Browse > Article
http://dx.doi.org/10.3745/JIPS.2011.7.1.137

Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks  

Kim, Hyo-Jin (Telecommunications and Technology Association of Korea)
Chitti, Ramachandra Bhargav (The Department of Computer Science, Yonsei University)
Song, Joo-Seok (The Department of Computer Science, Yonsei University)
Publication Information
Journal of Information Processing Systems / v.7, no.1, 2011 , pp. 137-150 More about this Journal
Abstract
Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.
Keywords
Collaborative Attack; Malicious Flooding Attack; Wireless Ad Hoc Network;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Al-Shurman, S.-M. Yoo, and S. Park, Black Hole Attack in Mobile Ad Hoc Networks, the 42nd annual southeast regional conference, ACM Southeast Regional Conference, 2004, pp.96-97.
2 Y.-C. Hu, A. Perrig, and D. B. Johnson, Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications, Vol.24, No.2, 2006, pp.370-380.   DOI   ScienceOn
3 P. Yi, Z. Dai, Y. Zhong, and S. Zhang, Resisting Flooding Attacks in Ad Hoc Networks, International Conference on Information Technology: Coding and Computing (ITCC 2005), Vol.2, 2005, pp.657-662.
4 C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing, the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ‘99), 1999, pp.90-100.
5 A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks, IEICE Transactions on Communications, Vol.E91-B, No.7, 2008, pp.2244-2254.   DOI   ScienceOn
6 B. A. Forouzan, Cryptography and Network Security, McGraw-Hill, 2008.
7 B.-G. Chun and M. Baker, Evaluation of Packet Scheduling Algorithms in Mobile Ad Hoc Networks, ACM Mobile Computing and Communications Review (MC2R), Vol.6, No.3, 2002, pp.36-49.   DOI
8 R. Kumar, M. Misra, and A. K. Sarje, A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks, International Symposium on Ad Hoc and Ubiquitous Computing (ISAUHC '06), 2006, pp.13-18.
9 S. Li, Q. Liu, H. Chen, and M. Tan, “A New Method to Resist Flooding Attacks in Ad Hoc Networks, International Conference on Wireless Communications”, Networking and Mobile Computing 2006 (WiCOM 2006), 2006, pp.1-4.
10 Z. Y. Xia and J. Wang, DIMH: “A novel model to detect and isolate malicious hosts for mobile ad hoc network”, Elsevier Computer Standards & Interfaces, Vol.28, 2006, pp.660-669.   DOI   ScienceOn
11 The VINT Project, The network simulator- ns-2, available at http://www.isi.edu/nsnam/ns/.
12 D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, Ad Hoc Networking, Chapter 5, Addison-Wesley, 2001, pp.139-172.
13 Y.-C. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, Vol.2, No.3, 2004, pp.28-39.
14 J. Li, D. Cordes, and J. Zhang, Power-Aware Routing Protocols in Ad Hoc wireless Networks, IEEE Wireless Communications, Vol.12, No.6, 2005, pp.69-81.   DOI   ScienceOn