Abstract
The mobile ad hoc networks (MANETs) are highly vulnerable to attacks because of its unique characteristics such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic network topology. In particular, distributed denial-of-service (DDoS) attacks can severely cripple network performance with relatively little effort expended by the attacker. These attacks throttle the tcp throughput heavily. A new defense scheme is proposed to develop a flow monitoring scheme to defend against such attacks in mobile adhoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The defense mechanism includes bandwidth reservation and distributed rate control. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
References
Luo, X., Chan, E.W.W., Chang, R.K.C.: Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals. EURASIP Journal on Advances in Signal Processing (2009)
Xiang, Y., Zhou, W., Chowdhury, M.: A Survey of Active and Passive Defense Mechanisms against DDoS Attacks, Technical reports, Computing series, Deakin university, School of Information Technology (2004)
Lai, W.-S., Lin, C.-H., Liu, J.-C., Huang, H.-C., Yang, T.-C.: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. International Journal of Software Engineering and Its Applications 2(4), 61–72 (2008)
Mehfuz, S., Doja, M.N.: Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs. Journal of Artificial Evolution and Applications (2008)
Nagesh, H.R., Chandra Sekaran, K.: Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks. International Journal of Computer Science and Network Security 7(7) (2007)
Wu, X., Yau, D.K.Y.: Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communication Security, pp. 365–367 (2006)
Sanyal, S., Abraham, A., Gada, D., Gogri, R., Rathod, P., Dedhia, Z., Mody, N.: Security Scheme for Distributed DoS in Mobile Ad Hoc Networks. ACM, Newyork (2004)
Yi, P., Dai, Z., Zhang, S., Zhong, Y.: A New Routing Attack in Mobile Ad Hoc Networks. International Journal of Information Technology 11(2) (2005)
Haggerty, J., Shi, Q., Merabti, M.:Statistical Signatures for Early Detection of Flooding Denial-Of service Attacks, vol. 181, pp. 327–341. Springer, Heidelberg (2005)
Vigna, G., Gwalani, S., Srinivasan, K.: An Intrusion Detection tool for AODV-based Ad hoc Wireless Networks. In: Proceedings of the Annual Computer Security Applications Conference, pp. 16–27 (2004)
Ren, W., Yeung, D.-Y., Jin, H., Yang, M.: Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks. International Journal of Network Security 4(2), 227–234 (2007)
Ahn, G.-S., Campbell, A.T., Veres, A., Sun, L.-H.: SWAN: Service Differentiation in Stateless Wireless Ad Hoc Networks. In: Proceedings of IEEE Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM, vol. 2 (2002)
Chauhan, G., Nandi, S.: QoS Aware Stable path Routing (QASR) Protocol for MANETs. In: First International Conference on Emerging Trends in Engineering and Technology, pp. 202–207 (2008)
Shevtekar, A., Ansari, N.: A router-based technique to mitigate reduction of quality (RoQ) attacks. Computer Networks: The International Journal of Computer & Telecommunication Networking 52(5), 957–970 (2008)
Rajaram, A., Palaniswami, S.: The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks. International Journal on Computer Science and Engineering 2(02), 400–408 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Arunmozhi, S.A., Venkataramani, Y. (2011). A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_21
Download citation
DOI: https://doi.org/10.1007/978-3-642-17881-8_21
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17880-1
Online ISBN: 978-3-642-17881-8
eBook Packages: Computer ScienceComputer Science (R0)