• Corpus ID: 45167676

Secured System against DDoS Attack in Mobile Adhoc Network

@inproceedings{Annamalai2012SecuredSA,
  title={Secured System against DDoS Attack in Mobile Adhoc Network},
  author={A. Annamalai and Venkataraman Yegnanarayanan},
  year={2012}
}
The risks to users of wireless technology have increased as the service has become more popular. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to the presence of malicious nodes and to ad hoc routing attacks. There are a wide variety of routing attacks that target the weakness of MANETs. This paper focuses on mobile ad hoc network's routing vulnerability and analyzes the network… 

Figures from this paper

A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks

This paper outlines various types of DoS attacks, which includes the effect of attack on node and network services, and gives the defense mechanism suggested by researchers for DoS attack and the other security measures that can be incorporate to avoid such attacks.

Attacks Prevention and Detection Techniques In MANET: A Survey

The survey of different kinds of attacks on MANET and Wireless sensor networks is proposed and a new hybrid algorithm for secure intrusion detection in MANET is implemented.

Securing wireless mobile nodes from distributed denial‐of‐service attacks

This paper proposes techniques to counteract distributed denial‐of‐service attacks on wireless mobile devices and describes the operation and architectural components of the model that is able to efficiently deal with the attacks.

DDOS ATTACKS RESISTANCE AND PREVENTION USING FAIR SCHEDULING AMONG MULTIPLE FLOWS SCHEME

Fair Scheduling among the Multiple Flows (FSMF) scheme increases the system defenses thereby it efficiently eliminates the unconstitutional attack in internet service provisioning and ensures immunity from misbehaving flows and allows for better congestion control in wireless network.

Enhanced Security Key Management Scheme for MANETS

The security is provided by two schemes namely the elliptic curve cryptography and the digital signature algorithm which prevent strong malicious attacks in MANET.

Efficient technique to Detect Blackhole Attack in Mobile Ad Hoc Networks

The resistive schemes against these attacks were proposed for Table Driven Source Routing (TDSR) protocol and the effectiveness of the schemes is validated using NS2 simulations.

IJSRD-International Journal for Scientific Research & Development| Vol. 3, Issue 01, 2015 | ISSN (online): 2321-0613

Different service availability attacks are presented which are attacked on an ad-hoc network to thwart the Denial of Service attacks differently effectively and save the vital securesensitive ad hoc networks obtainable for its intended use.

Analytical Model for Improved QoS and Security in Wireless Ad Hoc Networks

This paper proposes a mathematical model for improving both QoS and Security in wireless ad hoc networks and presents a model that takes into account the number of nodes, the Poisson packet arrival process and service process.

Performance Analysis of Chaotic DSSS-CDMA Synchronization Under Jamming Attack

The results of initial investigation show that the synchronization in DSSS-CDMA is vulnerable under these two jammers which may have significant effect on the probability of error rate.

Performance Analysis of Chaotic DSSS-CDMA Synchronization Under Jamming Attack

This paper investigates the performance of acquisition section of synchronization in direct-sequence spread spectrum (DSSS-CDMA) under jamming attacks. DSSS-CDMA in this study uses chaotic sequences.

References

SHOWING 1-10 OF 18 REFERENCES

A defense system on ddos attacks in mobile ad hoc networks

The proposed solution assures a minimum impact on the objective system infrastructure or the network communication interface to make it easy to implement and update, while providing an acceptable secure protection against DDoS attacks, such as Router Requirement (RREQ) flooding, data flooding and black-hole.

Improving AODV Protocol against Blackhole Attacks

This paper focuses on analyzing and improving the security of one of the popular routing protocol for MANETS viz. the Ad hoc On Demand Distance Vector (AODV) routing protocol, and proposes modifications to the AODV protocol to ensure the security against the Blackhole Attacks.

Novel defense mechanism against data flooding attacks in wireless ad hoc networks

A novel defense mechanism against data flooding attacks with the aim of enhancing the throughput of burst traffic is proposed and the simulation results show that the proposed scheme enhances the throughputOf burst traffic.

A New Routing Attack in Mobile Ad Hoc Networks

Flooding Attack Prevention (FAP) is developed, a generic defense against the Ad Hoc Flooding Attack in mobile ad hoc networks, where nodes deny any future request packets from the intruder.

SRSN: Secure Routing Based on Sequence Number for MANETs

A new method, SRSN (secure routing based on sequence number) is proposed, which based on the strict increment of sequence number of RREQ packet combined with reliable end to end acknowledgement to detect false route information to defend against black hole attack.

Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks

  • S. BucheggerJ. Boudec
  • Computer Science
    Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
  • 2002
A hybrid scheme of selective altruism and utilitarianism is presented to strengthen mobile ad hoc network protocols in their resistance to security attacks, while aiming at keeping network throughput high.

A survey of survivability in mobile ad hoc networks

This article introduces the most relevant survivable MANET initiatives where either preventive or reactive defenses are combined with tolerant ones and classify the defense lines taking into account intrusion tolerance mechanisms and also identifies properties and requirements of survivability.

Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests

A novel DDoS defense scheme based on TCP is hereby contrived because TCP is the dominant traffic for both the normal and lethal flows in the Internet.

D-WARD: a source-end defense against flooding denial-of-service attacks

D-WARD is proposed, a source- end DDoS defense system that achieves autonomous attack detection and surgically accurate response, thanks to its novel traffic profiling techniques, the adaptive response and the source-end deployment.