Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks

被引:23
作者
Kim, Hyojin [1 ]
Chitti, Ramachandra Bhargav [1 ]
Song, JooSeok [1 ]
机构
[1] Yonsei Univ, Dept Comp Sci, Seoul 120749, South Korea
关键词
Data flooding attack; throughput; burst traffic; wireless ad hoc network; DELIVERY;
D O I
10.1109/TCE.2010.5505973
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. The data flooding attack causes Denial of Service (DoS) attacks by flooding many data packets. However, there are a few existing defense systems against data flooding attacks. Moreover, the existing schemes may not guarantee the Quality of Service (QoS) of burst traffic since multimedia data are usually burst. Therefore, we propose a novel defense mechanism against data flooding attacks with the aim of enhancing the throughput. The simulation results show that the proposed scheme enhances the throughput of burst traffic(1).
引用
收藏
页码:579 / 582
页数:4
相关论文
共 13 条
[1]  
Al-Shurman M., 2004, Proceedings of the 42nd annual Southeast regional conference, P96
[2]  
[Anonymous], NETW SIM NS 2
[3]  
Desilva S, 2005, IEEE WCNC, P2112
[4]   Wormhole attacks in wireless networks [J].
Hu, YC ;
Perrig, A ;
Johnson, DB .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) :370-380
[5]  
HU YC, 2003, 2 ACM WORKSH WIR SEC, P30
[6]  
JAMALIPOUR A, 2008, IEEE WIREL COMMUN, V15, P2
[7]   Packet size based routing for stable data delivery in Mobile Ad-Hoc Networks [J].
Khan, Ashiq ;
Suzuki, Toshihiro ;
Kobayashi, Motonari ;
Takita, Wataru ;
Yamazaki, Kenichi .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2008, E91B (07) :2244-2254
[8]  
Kim H, 2006, LECT NOTES COMPUT SC, V3992, P1101
[9]  
Lee SJ, 2001, 2001 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-10, CONFERENCE RECORD, P3201, DOI 10.1109/ICC.2001.937262
[10]  
Li SB, 2006, IEEE INT C EMERG, P1