Skip to main content
Erschienen in: Telecommunication Systems 1/2014

01.01.2014

Attack containment in mobile ad-hoc networks through fair distribution of processing resources

verfasst von: Farzana Azam, Zeeshan Shafi Khan, Muhammad Sher, Khaled Alghathbar, Muhammad Khurram Khan

Erschienen in: Telecommunication Systems | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Due to frequent joining and leaving of nodes and better performance, use of flooding algorithms is always proffered in Mobile Ad-hoc Networks (MANETs). A single query transmitted by a node can be received by hundreds of nodes at 3rd or 4th hop. But it is also fact that flooding algorithms provide an opportunity to attackers for launching query flooding attacks. On one side these query flooding attacks results in wastage of valuable processing resources and on the other side they cause in starvation and delay at legitimate user’s end. To solve this problem we proposed attack containment techniques by providing a fair share of processing resources to every node. Fair distribution is achieved by designing different query distribution techniques based on mathematical models. Results obtained through network simulator 2 prove that the proposed solution is resilient against various types of flooding attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
1.
Zurück zum Zitat Daswani, N., & Garcia-Molina, H. (2002). Query-flood DoS attacks in Gnutella In ACM conference on computer and communications security, Washington, DC, November. Daswani, N., & Garcia-Molina, H. (2002). Query-flood DoS attacks in Gnutella In ACM conference on computer and communications security, Washington, DC, November.
2.
Zurück zum Zitat Daswani, N., & Garcia-Molina, H. (2005). Blasting in chord. Stanford CS technical report, January. Daswani, N., & Garcia-Molina, H. (2005). Blasting in chord. Stanford CS technical report, January.
3.
Zurück zum Zitat Daswani, N., & Garcia-Molina, H. (2004). Pong-cache poisoning in GUESS. In ACM conference on computer and communications security, Washington, DC, October. Daswani, N., & Garcia-Molina, H. (2004). Pong-cache poisoning in GUESS. In ACM conference on computer and communications security, Washington, DC, October.
4.
Zurück zum Zitat Daswani, N., Garcia-Molina, H., & Yang, B. (2003). Open problems in data-sharing peer-to-peer systems. In International conference on database theory, Siena, Italy, January. Daswani, N., Garcia-Molina, H., & Yang, B. (2003). Open problems in data-sharing peer-to-peer systems. In International conference on database theory, Siena, Italy, January.
6.
Zurück zum Zitat Sun, Q., Daswani, N., & Garcia-Molina, H. (2006). Maximizing RemoteWork in flooding-based peer-to-peer systems. J. Comput. Netw. Sun, Q., Daswani, N., & Garcia-Molina, H. (2006). Maximizing RemoteWork in flooding-based peer-to-peer systems. J. Comput. Netw.
7.
Zurück zum Zitat Sun, Q., Daswani, N., & Garcia-Molina, H. (2003). Maximizing remote work in flooding-based peer-to-peer systems. In 17th international symposium on distributed computing (DISC 2003), Sorrento, Italy, October. Sun, Q., Daswani, N., & Garcia-Molina, H. (2003). Maximizing remote work in flooding-based peer-to-peer systems. In 17th international symposium on distributed computing (DISC 2003), Sorrento, Italy, October.
8.
Zurück zum Zitat Jung, S., Hundewale, N., & Zelikovsky, A. (2005). Energy efficiency of load balancing in MANET routing protocols. New York: IEEE Press. Jung, S., Hundewale, N., & Zelikovsky, A. (2005). Energy efficiency of load balancing in MANET routing protocols. New York: IEEE Press.
9.
Zurück zum Zitat Wu, H., et al. (2004). Mddv: a mobility-centric data dissemination algorithm for vehicular networks. In Proc. 1st int’l. wksp. vehic., Oct. (pp. 47–56). Networks (VANET): Ad Hoc. Wu, H., et al. (2004). Mddv: a mobility-centric data dissemination algorithm for vehicular networks. In Proc. 1st int’l. wksp. vehic., Oct. (pp. 47–56). Networks (VANET): Ad Hoc.
10.
Zurück zum Zitat Shen, M., & Zhao, D. (2006). Throughput analysis of IEEE 802.11 and IEEE 802.11e MAC In The third international conference on quality of service in heterogeneous wired/wireless networks, Waterloo, ON, Canada, August 7–9. New York: ACM. Shen, M., & Zhao, D. (2006). Throughput analysis of IEEE 802.11 and IEEE 802.11e MAC In The third international conference on quality of service in heterogeneous wired/wireless networks, Waterloo, ON, Canada, August 7–9. New York: ACM.
11.
Zurück zum Zitat Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S., & Sheu, J.-P. (1999). The broadcast storm problem in mobile ad hoc networks. In Proc. MobiCom ’99, Seatle, USA, Aug. ACM, New York Ni, S.-Y., Tseng, Y.-C., Chen, Y.-S., & Sheu, J.-P. (1999). The broadcast storm problem in mobile ad hoc networks. In Proc. MobiCom ’99, Seatle, USA, Aug. ACM, New York
12.
Zurück zum Zitat Williams, B., & Camp, T. (2002). Comparison of broadcasting techniques for mobile ad hoc networks. In ACM MOBIHOC New York: ACM. Williams, B., & Camp, T. (2002). Comparison of broadcasting techniques for mobile ad hoc networks. In ACM MOBIHOC New York: ACM.
13.
Zurück zum Zitat Yoo, J., Gil, H.-r., & Kim, C.-k. (2003). INK: implicit neighbor knowledge routing in ad hoc networks. New York: IEEE Press. Yoo, J., Gil, H.-r., & Kim, C.-k. (2003). INK: implicit neighbor knowledge routing in ad hoc networks. New York: IEEE Press.
14.
Zurück zum Zitat Korkmaz, G., & Ekici, E. (2004). Urban MultiHop broadcast protocol for InterVehicle communication systems. In VANET’04. ACM, New York, Philadelphia, Pennsylvania, USA, October 1. New York: ACM. Korkmaz, G., & Ekici, E. (2004). Urban MultiHop broadcast protocol for InterVehicle communication systems. In VANET’04. ACM, New York, Philadelphia, Pennsylvania, USA, October 1. New York: ACM.
15.
Zurück zum Zitat Niculescu, D., & Nath, B. (2003). Trajectory based forwarding and its applications. In MobiCom’03, ACM New York, San Diego, California, USA, September 14–19. New York: ACM. Niculescu, D., & Nath, B. (2003). Trajectory based forwarding and its applications. In MobiCom’03, ACM New York, San Diego, California, USA, September 14–19. New York: ACM.
16.
Zurück zum Zitat Kosch, T., Adler, C. J., Eichler, S., Schroth, C., & Strassberger, M. (2006). The scalability problem of vehicular ad hoc networks and how to solve it. IEEE Wireless Communications, 13(5), 22–28. CrossRef Kosch, T., Adler, C. J., Eichler, S., Schroth, C., & Strassberger, M. (2006). The scalability problem of vehicular ad hoc networks and how to solve it. IEEE Wireless Communications, 13(5), 22–28. CrossRef
17.
Zurück zum Zitat Osafune, T., Lin, L., & Lenardi, M. (2006). Multi-hop vehicular broadcast (MHVB). In 6th international conferences on ITS telecommunications. Osafune, T., Lin, L., & Lenardi, M. (2006). Multi-hop vehicular broadcast (MHVB). In 6th international conferences on ITS telecommunications.
18.
Zurück zum Zitat Tomar, G. S., Dixit, M., & Verma, S. (2009). AODV routing protocol with selective flooding. In Proceedings of the 2009 international conference of soft computing and pattern recognition. Tomar, G. S., Dixit, M., & Verma, S. (2009). AODV routing protocol with selective flooding. In Proceedings of the 2009 international conference of soft computing and pattern recognition.
19.
Zurück zum Zitat Priya, L.R., & Chaki, N. (2009). A study on QoS issues for mobile ad-hoc networks In Proceedings of the 2nd international conference on interaction sciences: information technology, culture and human, Korea. Priya, L.R., & Chaki, N. (2009). A study on QoS issues for mobile ad-hoc networks In Proceedings of the 2nd international conference on interaction sciences: information technology, culture and human, Korea.
20.
Zurück zum Zitat Hwang, R.-H., & Hoh, C.-C. (2009). Cross-layer design of P2P file sharing over mobile ad hoc networks. Telecommunications Systems, 42(1–2), 47–61. CrossRef Hwang, R.-H., & Hoh, C.-C. (2009). Cross-layer design of P2P file sharing over mobile ad hoc networks. Telecommunications Systems, 42(1–2), 47–61. CrossRef
Metadaten
Titel
Attack containment in mobile ad-hoc networks through fair distribution of processing resources
verfasst von
Farzana Azam
Zeeshan Shafi Khan
Muhammad Sher
Khaled Alghathbar
Muhammad Khurram Khan
Publikationsdatum
01.01.2014
Verlag
Springer US
Erschienen in
Telecommunication Systems / Ausgabe 1/2014
Print ISSN: 1018-4864
Elektronische ISSN: 1572-9451
DOI
https://doi.org/10.1007/s11235-013-9754-6

Weitere Artikel der Ausgabe 1/2014

Telecommunication Systems 1/2014 Zur Ausgabe

Neuer Inhalt