Novel Defense Mechanism against Data Flooding Attacks in Ad Hoc Network

被引:0
|
作者
Bahaddur, Indira [1 ]
Triveni, C. L. [1 ]
Srikanth, P. C. [1 ]
机构
[1] Malnad Coll Engn, Dept Elect & Commun Engn, Hassan, India
关键词
Data flooding attack; throughput; burst traffic; wireless ad hoc network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Now a days, mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Consumer electronic devices have evolved depending on user needs. Users want to use compact and portable devices such as cellular phones, laptop computers, Personal Digital Assistants (PDAs), etc. anywhere and at anytime to download multimedia data or to access real-time traffic. The mobile Ad Hoc networks have several salient characteristics, such as Dynamic topologies, Bandwidth-constrained, Variable capacity links, Energy-constrained operation and Limited physical security. Due to these features, mobile Ad Hoc networks are particularly vulnerable to denial of service attacks launched through compromised node. The communication in mobile AdHoc networks comprises of two phases, the route discovery and the data transmission. In a hostile environment, adversarial nodes can try to disrupt communication in both the two phases. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. Flooding attack is a novel and powerful attack against on-demand Ad Hoc routing protocols. At present, FAP (Flooding Attack Prevention) is the single scheme proposed to resist such attack. But it may not give quality of service. In this paper, we present a Period Based Defense mechanism against data flooding attack in wireless AdHoc network. This is the new technique to defend the flooding attack. This scheme is based on the periods and uses a blacklist to efficiently prevent the data flooding attack. The main aim of this paper is to enhance the throughput of burst traffic. As a result of which, many data packets are forwarded at a high rate for the whole duration. The simulation results show that the proposed scheme enhances the throughput of burst traffic.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks
    Kim, Hyojin
    Chitti, Ramachandra Bhargav
    Song, JooSeok
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2010, 56 (02) : 579 - 582
  • [2] Period-based defense mechanism against malicious data packet flooding attacks in wireless ad hoc networks
    Kim, Hyojin
    Song, JooSeok
    2010 DIGEST OF TECHNICAL PAPERS INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS ICCE, 2010,
  • [3] A flow based detection mechanism against flooding attacks in mobile ad hoc networks
    Guo, Yinghua
    Gordon, Steven
    Perreau, Sylvie
    2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3107 - +
  • [4] Swarm Based Architecture for Defense Against Stealthy Attacks in Mobile Ad Hoc Network
    Ranjan, Abhishek
    Kuthadi, Venu Madhav
    Marwala, Tshilidzi
    Selvaraj, Rajalakshmi
    AD HOC & SENSOR WIRELESS NETWORKS, 2017, 36 (1-4) : 107 - 126
  • [5] Software defined network moving target defense mechanism against link flooding attacks
    Xie L.
    Ding Y.
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2019, 59 (01): : 36 - 43
  • [6] Resisting flooding attacks in ad hoc networks
    Yi, P
    Dai, ZL
    Zhong, YP
    Zhang, SY
    ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 657 - 662
  • [7] Defense against injecting traffic attacks in cooperative ad hoc networks
    Yu, W
    Liu, KJR
    GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1737 - 1741
  • [8] Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
    Chen, Ruiliang
    Snow, Michael
    Park, Jung-Min
    Refaei, M. Tamer
    Eltoweissy, Mohamed
    GLOBECOM 2006 - 2006 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2006,
  • [9] A Defense Mechanism for EOLSR against DOS Attacks in Ad hoc Networks Using Trust Based System
    Balaji, Banothu
    Khan, Mohammed Hassan
    Murthy, T. S. N.
    Kim, Tai-Hoon
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 51 - 64
  • [10] Innovative survey of defense machinery against Sybil attacks over wireless ad hoc network on IoT
    Singh, Arun Kumar
    JOURNAL OF ENGINEERING RESEARCH, 2021, 9 (02): : 92 - 105