Title :
Novel Defense mechanism against data flooding attacks in ad hoc network
Author :
Bahaddur, Indira ; Triveni, C.L. ; Srikanth, P.C.
Author_Institution :
Dept. of Electron. & Commun. Eng., Malnad Coll. of Eng., Hassan, India
Abstract :
Now a days, mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Consumer electronic devices have evolved depending on user needs. Users want to use compact and portable devices such as cellular phones, laptop computers, Personal Digital Assistants (PDAs), etc. anywhere and at anytime to download multimedia data or to access realtime traffic. The mobile Ad Hoc networks have several salient characteristics, such as Dynamic topologies, Bandwidth-constrained, Variable capacity links, Energy-constrained operation and Limited physical security. Due to these features, mobile Ad Hoc networks are particularly vulnerable to denial of service attacks launched through compromised node. The communication in mobile AdHoc networks comprises of two phases, the route discovery and the data transmission. In a hostile environment, adversarial nodes can try to disrupt communication in both the two phases. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. Flooding attack is a novel and powerful attack against on-demand Ad Hoc routing protocols. At present, FAP (Flooding Attack Prevention) is the single scheme proposed to resist such attack. But it may not give quality of service. In this paper, we present a Period Based Defense mechanism against data flooding attack in wireless AdHoc network. This is the new technique to defend the flooding attack. This scheme is based on the periods and uses a blacklist to efficiently prevent the data flooding attack. The main aim of this paper is to enhance the throughput of burst traffic. As a result of which, many data packets are forwarded at a high rate for the whole duration. The simulation results show that the proposed scheme enhances the throughput of burst traffic.
Keywords :
mobile ad hoc networks; quality of service; routing protocols; telecommunication network topology; telecommunication security; telecommunication traffic; PDA; adversarial nodes; bandwidth-constrained variable capacity links; battery power; burst traffic; cellular phones; compromised node; consumer electronic devices; data flooding attacks; data packets; data transmission; denial of service attacks; dynamic topologies; energy-constrained operation; flooding attack prevention; hostile environment; laptop computers; limited physical security; mobile ad hoc networks; mobile users; multimedia data; on-demand ad hoc routing protocols; period based defense mechanism; personal digital assistants; quality of service; realtime traffic; route discovery; security threats; wireless ad hoc network; Floods; Mobile ad hoc networks; Mobile nodes; Quality of service; Routing protocols; Throughput; Data flooding attack; burst traffic; throughput; wireless ad hoc network;
Conference_Titel :
Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on
Conference_Location :
Tiruchengode
Print_ISBN :
978-1-4799-3925-1
DOI :
10.1109/ICCCNT.2013.6726662