Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks


HyoJin Kim, Ramach, ra Bhargav Chitti, JooSeok Song, Journal of Information Processing Systems Vol. 7, No. 1, pp. 137-150, Mar. 2011  

10.3745/JIPS.2011.7.1.137
Keywords: Collaborative Attack, Malicious Flooding Attack, Wireless Ad Hoc Network
Fulltext:

Abstract

Mobile ad hoc networks are expected to be widely used in the near future. However, they are susceptible to various security threats because of their inherent characteristics. Malicious flooding attacks are one of the fatal attacks on mobile ad hoc networks. These attacks can severely clog an entire network, as a result of clogging the victim node. If collaborative multiple attacks are conducted, it becomes more difficult to prevent. To defend against these attacks, we propose a novel defense mechanism in mobile ad hoc networks. The proposed scheme enhances the amount of legitimate packet processing at each node. The simulation results show that the proposed scheme also improves the end-to-end packet delivery ratio.


Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.




Cite this article
[APA Style]
Kim, H., , Chitti, r., & Song, J. (2011). Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks. Journal of Information Processing Systems, 7(1), 137-150. DOI: 10.3745/JIPS.2011.7.1.137 .

[IEEE Style]
H. Kim, Ramach, r. B. Chitti, J. Song, "Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks," Journal of Information Processing Systems, vol. 7, no. 1, pp. 137-150, 2011. DOI: 10.3745/JIPS.2011.7.1.137 .

[ACM Style]
HyoJin Kim, Ramach, ra Bhargav Chitti, and JooSeok Song. 2011. Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks. Journal of Information Processing Systems, 7, 1, (2011), 137-150. DOI: 10.3745/JIPS.2011.7.1.137 .