Browse > Article

Traceback Technique using Table-based Route Management under Mobile Ad Hoc Network Environment  

Yang, Hwan Seok (중부대학교 정보보호학과)
Yoo, Seung Jae (중부대학교 정보보호학과)
Publication Information
Abstract
MANET has a highly dynamic topology because it consists of only mobile nodes. Various attacks using these characteristics exist. Among them, damage of the attacks based flooding such as DoS or DDos is large and traceback of the attack node is not easy. It is because route information by moving of intermediate nodes which pass the data changes frequently. In this paper, we propose table-based traceback technique to perform efficient traceback although route information by moving of nodes changes frequently. Cluster head manages route management table in order to form cluster status table and network topology snapshot for storing the location information of mobile nodes when cluster member nodes change. Also, bloom filter is used to reduce the amount of storing route information. The performance of the proposed technique is confirmed through experiment.
Keywords
Traceback Technique; DoS Attack; Network Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Park and H. Lee, "On the Effectiveness of Route-based Packet Filtering for Ditributed DoS Attack Prevention in Power-Law Internet," Proc. ACM SIGCOMM'01, pp.15-26, 2001.
2 Zhang, Q, Zhou X and Li X, "Contact-Based Traceback in Wireless Sensor Networks," In Proceedings of the Wireless Communications, Networking and Mobile Computing, Shanghai, China, pp.2487-2490, 2007.
3 Yi-an Huang, Wenke Lee, "Hotspot-based Traceback for Mobile Ad Hoc Networks," ACM Proceedings of the 4th ACM Workshop on Wireless Security, pp.43-54, 2005.
4 Il Yong Kim and Ki Chang Kim, "A Resource-efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter," ICCIT. Nov. 2008.
5 Pathan, A.S.K, Lee, H.W and Hong, C.S, "Security in Wireless Sensor Networks: Issues and Challenges," International Conference Advanced Communication Technology, pp.1043-1048, 2006.
6 C. Gong and K. Sarac, "Toward a Practical Packet Marking Approach for IP Traceback," International Journal of Network Security, Vol. 8, pp.271-281, 2009.
7 D. X. Song and A. Perrig, "Advacned and Authenticated Marking Schemes for IP Traceback," Proc. IEEE INFOCOM'01, Apr. 2001.