Skip to main content

A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks

  • Conference paper
Advanced Computing (CCSIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 133))

Abstract

The mobile ad hoc networks (MANETs) are highly vulnerable to attacks because of its unique characteristics such as open network architecture, shared wireless medium, stringent resource constraints and highly dynamic network topology. In particular, distributed denial-of-service (DDoS) attacks can severely cripple network performance with relatively little effort expended by the attacker. These attacks throttle the tcp throughput heavily. A new defense scheme is proposed to develop a flow monitoring scheme to defend against such attacks in mobile adhoc networks. Our proposed defense mechanism uses the medium access control (MAC) layer information to detect the attackers. The defense mechanism includes bandwidth reservation and distributed rate control. Once the attackers are identified, all the packets from those nodes will be blocked. The network resources are made available to the legitimate users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Luo, X., Chan, E.W.W., Chang, R.K.C.: Detecting Pulsing Denial-of-Service Attacks with Nondeterministic Attack Intervals. EURASIP Journal on Advances in Signal Processing (2009)

    Google Scholar 

  2. Xiang, Y., Zhou, W., Chowdhury, M.: A Survey of Active and Passive Defense Mechanisms against DDoS Attacks, Technical reports, Computing series, Deakin university, School of Information Technology (2004)

    Google Scholar 

  3. Lai, W.-S., Lin, C.-H., Liu, J.-C., Huang, H.-C., Yang, T.-C.: Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. International Journal of Software Engineering and Its Applications 2(4), 61–72 (2008)

    Google Scholar 

  4. Mehfuz, S., Doja, M.N.: Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs. Journal of Artificial Evolution and Applications (2008)

    Google Scholar 

  5. Nagesh, H.R., Chandra Sekaran, K.: Design and Development of Proactive Models for Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks. International Journal of Computer Science and Network Security 7(7) (2007)

    Google Scholar 

  6. Wu, X., Yau, D.K.Y.: Mitigating Denial-of-Service Attacks in MANET by Distributed Packet Filtering: A Game-theoretic Approach. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communication Security, pp. 365–367 (2006)

    Google Scholar 

  7. Sanyal, S., Abraham, A., Gada, D., Gogri, R., Rathod, P., Dedhia, Z., Mody, N.: Security Scheme for Distributed DoS in Mobile Ad Hoc Networks. ACM, Newyork (2004)

    Google Scholar 

  8. Yi, P., Dai, Z., Zhang, S., Zhong, Y.: A New Routing Attack in Mobile Ad Hoc Networks. International Journal of Information Technology 11(2) (2005)

    Google Scholar 

  9. Haggerty, J., Shi, Q., Merabti, M.:Statistical Signatures for Early Detection of Flooding Denial-Of service Attacks, vol. 181, pp. 327–341. Springer, Heidelberg (2005)

    Google Scholar 

  10. Vigna, G., Gwalani, S., Srinivasan, K.: An Intrusion Detection tool for AODV-based Ad hoc Wireless Networks. In: Proceedings of the Annual Computer Security Applications Conference, pp. 16–27 (2004)

    Google Scholar 

  11. Ren, W., Yeung, D.-Y., Jin, H., Yang, M.: Pulsing RoQ DDoS Attack and Defense Scheme in Mobile Ad Hoc Networks. International Journal of Network Security 4(2), 227–234 (2007)

    Google Scholar 

  12. Ahn, G.-S., Campbell, A.T., Veres, A., Sun, L.-H.: SWAN: Service Differentiation in Stateless Wireless Ad Hoc Networks. In: Proceedings of IEEE Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM, vol. 2 (2002)

    Google Scholar 

  13. Chauhan, G., Nandi, S.: QoS Aware Stable path Routing (QASR) Protocol for MANETs. In: First International Conference on Emerging Trends in Engineering and Technology, pp. 202–207 (2008)

    Google Scholar 

  14. Shevtekar, A., Ansari, N.: A router-based technique to mitigate reduction of quality (RoQ) attacks. Computer Networks: The International Journal of Computer & Telecommunication Networking 52(5), 957–970 (2008)

    Article  MATH  Google Scholar 

  15. Rajaram, A., Palaniswami, S.: The Trust-Based MAC-Layer Security Protocol for Mobile Ad hoc Networks. International Journal on Computer Science and Engineering 2(02), 400–408 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Arunmozhi, S.A., Venkataramani, Y. (2011). A New Defense Scheme against DDoS Attack in Mobile Ad Hoc Networks. In: Meghanathan, N., Kaushik, B.K., Nagamalai, D. (eds) Advanced Computing. CCSIT 2011. Communications in Computer and Information Science, vol 133. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17881-8_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-17881-8_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-17880-1

  • Online ISBN: 978-3-642-17881-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics