Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications

Venkat Balakrishnan*, Vijay Varadharajan, Uday Tupakula, Marie Elisabeth Gaup Moe

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

15 Citations (Scopus)
33 Downloads (Pure)

Abstract

Recently several techniques that provide different degree of anonymity have been proposed for wired and wireless communication. Although, the recently proposed techniques are successful in achieving high degree of anonymity, there are some disadvantages associated with the proposed techniques. In this paper we analyze the flooding and packet drop attacks in mobile ad hoc networks that support anonymous communication. Then we propose a novel technique to deal with the flooding attacks. Our approach can efficiently identify and isolate the malicious node that floods the network. In addition, our technique provides a mechanism to identify the benign behavior of an expelled node and rejoins the expelled node back into the network. Furthermore, our approach does not require any additional packets to communicate the behavior of the flooding node and hence does not incur any additional overhead. Finally we validate the performance analysis of our technique through NS2 simulations.

Original languageEnglish
Title of host publicationThe 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007
EditorsLisa O'Conner
Place of PublicationLos Alamitos, CA
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages1-6
Number of pages6
ISBN (Print)0769528422, 9780769528427
DOIs
Publication statusPublished - 2007
Event2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007 - Sydney, Australia
Duration: 27 Aug 200730 Aug 2007

Other

Other2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007
CountryAustralia
CitySydney
Period27/08/0730/08/07

Bibliographical note

Copyright 2007 IEEE. Reprinted from Proceedings of the 2nd international conference on wireless broadband and ultra wideband communications (2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to pubs-permissions@ieee.org. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

Fingerprint Dive into the research topics of 'Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications'. Together they form a unique fingerprint.

Cite this