Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks

被引:6
作者
Kim, HyoJin [1 ]
Chitti, Ramachandra Bhargav [2 ]
Song, JooSeok [2 ]
机构
[1] Telecommun & Technol Assoc Korea, Seoul, South Korea
[2] Yonsei Univ, Dept Comp Sci, Comp Sci, Seoul, South Korea
来源
JOURNAL OF INFORMATION PROCESSING SYSTEMS | 2011年 / 7卷 / 01期
基金
新加坡国家研究基金会;
关键词
Collaborative Attack; Malicious Flooding Attack; Wireless Ad Hoc Network;
D O I
10.3745/JIPS.2011.7.1.137
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.
引用
收藏
页码:137 / 150
页数:14
相关论文
共 13 条
  • [1] Al-Shurman M., 2004, P 42 ANN SE REGIONAL, P96
  • [2] Chun B.G., 2002, MOB COMPUT COMMUN RE, V6, P36
  • [3] Forouzan Behrouz, 2008, CRYPTOGRAPHY NETWORK
  • [4] Wormhole attacks in wireless networks
    Hu, YC
    Perrig, A
    Johnson, DB
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 370 - 380
  • [5] A survey of secure wireless ad hoc routing
    Hu, YC
    Perrig, A
    [J]. IEEE SECURITY & PRIVACY, 2004, 2 (03) : 28 - 39
  • [6] Johnson DB, 2001, AD HOC NETWORKING, P139
  • [7] Packet size based routing for stable data delivery in Mobile Ad-Hoc Networks
    Khan, Ashiq
    Suzuki, Toshihiro
    Kobayashi, Motonari
    Takita, Wataru
    Yamazaki, Kenichi
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (07) : 2244 - 2254
  • [8] Kumar R., 2006, INT S AD HOC UB COMP, P13
  • [9] Power-aware routing protocols in ad hoc wireless networks
    Li, JF
    Cordes, D
    Zhang, JY
    [J]. IEEE WIRELESS COMMUNICATIONS, 2005, 12 (06) : 69 - 81
  • [10] Li SJ, 2006, NEW FRONTIERS IN POLYMER RESEARCH, P1