Security in MANET Against DDoS Attack

  IJCTT-book-cover
 
International Journal of ComputerTrends and Technology (IJCTT)          
 
© 2014 by IJCTT Journal
Volume-7 Number-1                          
Year of Publication : 2014
Authors : V.Kaviyarasu , S.Baskaran
DOI :  10.14445/22312803/IJCTT-V7P124

citation

 

      V.Kaviyarasu , S.Baskaran. Article: Security in MANET Against DDoS Attack. International Journal of Computer Trends and Technology (IJCTT) 7(1):47-51, January 2014. Published by Seventh Sense Research Group.

Abstract-
      Mobile ad-hoc network is a group of two or more devices or nodes with the capability of communication and networking. It is an infrastructure less network. Such network may operate by them or may be connected to a larger internet. Due to its mobility and self routing capability nature, there are many weaknesses in its security. The security of the network from various attacks is an important issue in MANET application now days. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to many attacks. This paper focuses on mobile ad hoc network`s routing vulnerability and analyzes the network performance under Distributed Denial of Service MANETS. The resistive schemes against these attacks were proposed for Ad hoc on demand Distance Vector (AODV) routing protocol and the effectiveness of the schemes is validated using NS2 simulations.

References
[1] S.A.Arunmozhi and Y.Venkataramani, A Flow Monitoring Scheme to Defend Reduction-of- Quality (RoQ) Attacks in Mobile Ad-hoc Networks, Information Security Journal: AGlobal Perspective, Vol.19, No.5, 2010, pp.263- 272.
[2] JelenaMirkovic and Peter Reiher, D-WARD: A Source-End Defense against Flooding Denialof- Service Attacks, IEEE Transactions OnDependable And Secure Computing, Vol. 2, No. 3, 2005, pp. 216-232.
[3] Ping Yi, Zhoulin Dai, YiPingZhong and Shiyong Zhang, Resisting Flooding Attacks in Ad Hoc Networks, Proceedings of theInternational Conference on InformationTechnology: Coding and Computing (ITCC`05), Vol. 2.
[4] Hyojin Kim, RamachandraBhargavChitti, and JooSeok Song, Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks, IEEE Transactions onConsumer Electronics, Vol. 56, No. 2, May 2010, pp. 579-582.
[5] N. Karthikeyan, V. Palanisamy and K.Duraiswamy, Optimum Density Based Model for Probabilistic Flooding Protocol in Mobile Ad Hoc Network, European Journal ofScientific Research, Vol.39, No.4, 2010, pp.577-588.
[6] Xuan Yu, A Defense System On Ddos Attacks In Mobile Ad Hoc Networks, Ph.D dissertation, Auburn University, Alabama, May 2007.
[7] Ming-Yang Su, Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems, ComputerCommunications, Vol. 34, 2011, pp. 107–117.
[8] SupranamayaRanjan, Ram Swaminathan, Mustafa Uysal, Antonio Nucci and Edward BKnightly, DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks, IEEE/ACM Transactions OnNetworking, Vol. 17, No. 1, February 2009, pp. 26-39.
[9] AmeyShevtekar and Nirwan Ansari, A routerbased technique to mitigate reduction of quality (RoQ) attacks, Computer Networks, Vol. 52, 2008, pp. 957–970.
[10] Ping Yi, Zhoulin Dai, Shiyong Zhang and YipingZhong, A New Routing Attack in Mobile Ad Hoc Networks, InternationalJournal of Information Technology, Vol. 11, No. 2, 2005, pp.83 94.
[11] Michele Nogueira Lima, AldriLuiz dos Santos and Guy Pujolle, A Survey of Survivability in Mobile Ad Hoc Networks,IEEE Communications Surveys & Tutorials, Vol. 11, No. 1, 2009, pp. 66-77.
[12] S.Sanyal, A.Abraham, D. Gada, R.Gogri, P.Rathod, Z.Dedhia and N.Mody, Security scheme for distributed DoS in mobile adhoc networks. ACM, New York, 2004.
[13] H. Deng, W. Li and D.P.Agrawal, Routing security in wireless ad hoc networks, IEEECommunications Magazine, Vol. 40, No. 10, 2002, pp. 70- 75
[14] P.Ebinger and M.Parsons, Measuring the Impact of Attacks on the Performance of Mobile BAd hoc Networks, ACM PE-WASUN: Proceedings of the 6th ACM InternationalSymposium on Performance Evaluation ofWireless Ad Hoc, Sensor, and UbiquitousNetwork, 2009.
[15] ZhiqiangGao and Zhiqiang, Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests, IEEECommunications Letters, Vol. 10, No. 11, 2006, pp. 793-795.
[16] JunhaiLuo, Mingyu Fan and Danxia Ye, Black Hole Attack Prevention Based on Authentication Mechanism, 11th IEEESingapore International Conference onCommunication Systems, 2008, pp.173-177.
[17] ElmarGerhards Padilla, Nils Aschenbruck, Peter Martini, Marko Jahnke, and Jens T¨olle, Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs, Proceedingsof 32nd IEEE Conference on Local ComputerNetworks, 2007, pp. 1043-1052.
[18] M.Al-Shurman, S.Yoo and S.Park, Black hole Attack in Mobile Ad Hoc Networks. ACMSoutheast Regional Conference, 2004, pp. 96- 97
[19] Jieying Zhou, Junwei Chen and Huiping Hu, SRSN: Secure Routing based on Sequence Number for MANETs, InternationalConference on Wireless Communications,Networking and Mobile Computing, 2007, pp.1569-1572
[20] NitalMistry, Devesh C Jinwala and MukeshZaveri, Improving AODV Protocol against Blackhole Attacks, Proceedings of theInternational Multiconference of Engineers andComputer Scientist, Hong Kong, Vol. II, 2010.
[21 Z.Gao and N.Anzari, Differentiating malicious DDoS attack traffic from normal TCP flows by proactive tests, IEEE CommunicationsLetters, Vol. 10, No. 11, 2006, pp. 793-795.
[22] X.Wu and D.K.Y Yau, Mitigating denialof- service attacks in MANET by distributed packet filtering: A game-theoretic approach, Proceedings of the 2nd ACM Symposium onInformation, Computer and CommunicationSecurity, 2006, pp. 365–367.
[23] P.Ebinger and M.Parsons, Measuring the impact of attacks on the performance of mobile ad hoc networks. ACM PE-WASUN:Proceedings of the 6th ACM InternationalSymposium on Performance Evaluation ofWireless Ad Hoc, Sensor, and UbiquitousNetworks, Canary Islands, Spain, 2009.
[24] J.Haggerty, Q.Shi and M.Merabti, Statistical signatures for early detection of flooding denial-of-service attacks, Security andPrivacy in the Age or ubiquitous Computing,IFIP Advances in Information andCommunication Technology, Vol. 181, 2005,pp. 327-341.
[25] X.Luo, E.W.W.Chan and R.K.C.Chang, Detecting pulsing denial-of-service attacks with nondeterministic attack intervals, EURASIPJournal on Advances in Signal Processing, Vol.2009, pp.1-13.
[26] Buchegger and J. Boudec, Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks, Proceedings of the 10th Euromicro Workshopon Parallel, Distributed and Network-basedProcessing, Canary Islands, Spain, 2002.
[27] S. Marti, T. Giuli, K. Lai, and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. of the Sixth AnnualInternational Conference on Mobile Computingand Networking (MOBICOM), Boston, 2000.

Keywords Security, Mobile ad-hoc network, Denial of service, Flooding attack, Black hole attack. Cox Communications