TY - GEN
T1 - Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications
AU - Balakrishnan, Venkat
AU - Varadharajan, Vijay
AU - Tupakula, Uday
AU - Moe, Marie Elisabeth Gaup
N1 - Copyright 2007 IEEE. Reprinted from Proceedings of the 2nd international conference on wireless broadband and ultra wideband communications (2007). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of Macquarie University’s products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it.
PY - 2007
Y1 - 2007
N2 - Recently several techniques that provide different degree of anonymity have been proposed for wired and wireless communication. Although, the recently proposed techniques are successful in achieving high degree of anonymity, there are some disadvantages associated with the proposed techniques. In this paper we analyze the flooding and packet drop attacks in mobile ad hoc networks that support anonymous communication. Then we propose a novel technique to deal with the flooding attacks. Our approach can efficiently identify and isolate the malicious node that floods the network. In addition, our technique provides a mechanism to identify the benign behavior of an expelled node and rejoins the expelled node back into the network. Furthermore, our approach does not require any additional packets to communicate the behavior of the flooding node and hence does not incur any additional overhead. Finally we validate the performance analysis of our technique through NS2 simulations.
AB - Recently several techniques that provide different degree of anonymity have been proposed for wired and wireless communication. Although, the recently proposed techniques are successful in achieving high degree of anonymity, there are some disadvantages associated with the proposed techniques. In this paper we analyze the flooding and packet drop attacks in mobile ad hoc networks that support anonymous communication. Then we propose a novel technique to deal with the flooding attacks. Our approach can efficiently identify and isolate the malicious node that floods the network. In addition, our technique provides a mechanism to identify the benign behavior of an expelled node and rejoins the expelled node back into the network. Furthermore, our approach does not require any additional packets to communicate the behavior of the flooding node and hence does not incur any additional overhead. Finally we validate the performance analysis of our technique through NS2 simulations.
UR - http://www.scopus.com/inward/record.url?scp=47749095104&partnerID=8YFLogxK
U2 - 10.1109/AUSWIRELESS.2007.46
DO - 10.1109/AUSWIRELESS.2007.46
M3 - Conference proceeding contribution
AN - SCOPUS:47749095104
SN - 0769528422
SN - 9780769528427
SP - 1
EP - 6
BT - The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007
A2 - O'Conner, Lisa
PB - Institute of Electrical and Electronics Engineers (IEEE)
CY - Los Alamitos, CA
T2 - 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007
Y2 - 27 August 2007 through 30 August 2007
ER -