Computer Science ›› 2017, Vol. 44 ›› Issue (1): 159-166.doi: 10.11896/j.issn.1002-137X.2017.01.031

Previous Articles     Next Articles

Defense Technology Based on Dynamic Space-Time Performance for Flooding Attacks in Mobile Ad Hoc Networks

WANG Wei, WANG Jia-jun, WANG Ming-ming, ZHANG Wen-jing and CHEN Jin-guang   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Flooding attacks is a kind of seriously harmful DOS attack in mobile Ad Hoc networks.However,the existing researches on security defense for flooding attacks are almost unfit for the characteristics (such as limited resource,dynamic topology) in Ad Hoc networks,and couldn’t keep the balance between network performance and network security.On the basis of analysis of the inherent relations among space-time dynamic properties,network performance evaluation and security threatens,a defense technology based on performance evaluation for Flooding attacks in mobile Ad Hoc networks was presented.With the measurable system evaluation indexes for security threaten,defense income and cost,the mechanism of making defense policies and optimizing defense performance is achieved in the proposed system.Simulation results show that the proposed defense technology can overcome a good many drawbacks in the existing security technologies for mobile Ad Hoc networks.Consequently,the proposed technology can meet the network pro-perties and actual application of mobile Ad Hoc networks.

Key words: Mobile Ad Hoc networks,Flooding attacks,Network performance evaluation,Space-time dynamics,Security threatens

[1] MEHER R,LADHE S.Review Paper on Flooding Attack inMANET [J].Journal of Engineering Research and Applications,2014,4(1):39-46.
[2] LI F,JASSIM S.Malicious nodes seriously affect the performance of mobile ad hoc networks [EB/OL].[2014-9-21].http://spie.org/x8693.xml.
[3] HE Jin-lu,CHU Wei,LIU Hui-zhou.Research and Improve-ment of AODV Routing Protocol[J].Computer Engineering,2015,41(1):110-114.(in Chinese) 何绵禄,褚伟,刘辉舟.AODV路由协议的研究和改进[J].计算机工程,2015,41(1):110-114.
[4] DORRI A,KAMEL S R,KHEIRKHAH E.Security challenges in mobile ad hoc networks:a survey [J].International Journal of Computer Science and Engineering Survey,2015,6(1):15-29.
[5] LIANG M,TING H,SWAMI A,et al.Node Failure Localization via Network Tomography[C]∥Proc.of the 2014 Confe-rence on Internet Measurement Conference.Vancouver,BC,Canada,2014:195-208.
[6] ZAMANI A T,ZUBAIR S.Security in Routing Protocol for Ad Hoc Networks [J].International Journal of Science and Research,2014,3(4):375-380.
[7] KATARIA J,DHEKNE P S,SANYAL S.A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks[C]∥Proc.of the 3rd International Conference on Computers and Devices for Communication.West,India,2006:198-201.
[8] AHMAD S,AWAAN I,WAQQAS A,et al.Performance Analysis of DSR & Extended DSR Protocols [C]∥Proc.of the 2nd Asia International Conference on Modeling & Simulation.Kuala Lumpur,2008:191-196.
[9] GOPALAKRISHNAN S,GANESHKUMAR P.Intrusion De-tection in Mobile Ad Hoc Network Using Secure Routing For Attacker Identification Protocol [J].American Journal of Applied Sciences,2014,11(8):1391-1397.
[10] ZISHAN N,CHOLE V.Intrusion Detection Systems and Securi-ty Aspects for Mobile Ad Hoc Networks [J].International Journal on Recent and Innovation Trends in Computing and Communication,2015,3(2):446-448.
[11] ZHANG Y,LEE W.Intrusion Detection Techniques for Mobile MANET [J].Wireless Networks Journal,2003,9(5):545-556.
[12] LEILA M,DJEMILI T F,SALIM G.MASID:Multi-Agent System for Intrusion Detection in MANET [C]∥Proc.of the Ninth International Conference on Information Technology:New Gene-rations (ITNG).Las Vegas:IEEE Press,2012:65-70.
[13] WANG W,MAN H,LIU Y.A framework for intrusion detection systems by social network analysis methods in ad hoc networks [J].Security Communication Networks,2009,2(6):669-685.
[14] ZHANG Xiao-ning,FENG Deng-guo.Instrusion dectection forad hoc routing based on fuzzy behavior analysis[J].Journal of Computer Research and Development,2006,3(4):621-626.(in Chinese) 张晓宁,冯登国.基于模糊行为分析的移动自组网入侵检测[J].计算机研究与发展,2006,3(4):621-626.
[15] YI P,JIANG Xing-hao,WU Yue,et al.Distributed intrusion detection for mobile ad hoc networks [J].Journal of Systems Engineering and Electronics,2008,19(4):851-859.
[16] MARCHANG N,DATTA R.Collaborative techniques for intrusion detection in mobile ad-hoc networks [J].Ad Hoc Networks,2008,6(2008):508-523.
[17] OTROK H,MOHAMM N,WANG L,et al.A game-theoretic intrusion detection model for mobile ad hoc networks [J].Computation Communication,2008,31(4):708-721.
[18] MANOUSAKIS K,STERNE D,IVANIC N,et al.A stochastic approximation approach for improving intrusion detection data fusion structures [C]∥Proc.of the IEEE Military Communications Conference.San Diego,CA,2008:1-7.
[19] EU Z A,KHOON W,SEAH G H.Mitigating Route RequestFlooding Attacks in Mobile Ad hoc Networks [C]∥Proc.of International Conferences on Information Networking.Sendai,Japan,2006.
[20] YI S,KRAVETS R.Composite Key Management for Ad Hoc Networks [C]∥Proc.of the 1st Annual International Conferen-ce on Mobile and Ubiquitous Systems:Networking and Servi-ces.2004:52-61.
[21] SHANDILYA S K,SAHU S.A trust based security scheme for RREQ flooding attack in MANET [J].International Journal of Computer Applications,2010,5(12):4-8.
[22] BHUVANESHWARI K,DEVARAJ A F S.PDS-A Profilebased Detection Scheme for flooding attack in AODV based MANET [J].International Journal of Security,Privacy and Trust Management,2013,2(3):17-28
[23] C J D.A new authentication model for ad hoc networks[J].International Journal of Information Security,2012,11(5):333-347.
[24] WANG Wei,GUAN Xiao-hong,WANG Bei-zhan,et al.Evaluation method with measureable space-time dynamic properties for mobile ad hoc networks[J].Journal of Software,2011,22(6):1333-1349.(in Chinese) 王伟,管晓宏,王备战,等.可量化的移动Ad Hoc网络时空动态特性评估方法[J].软件学报,2011,22(6):1333-1349.
[25] LI Y,CAI W,TIAN G I,et al.Loss Cumulant Generating Function Inference in Sensor Network[C]∥Proc.of the International Conference on Wireless Communications,Networking and Mobile Computing.Wuhan,China,2006:1-4.
[26] JIAO Li,LIN Yu,WANG Wen-dong,et al.A novel algorithm for link delay inference in the neteorks with load-balance routing[J].Journal of Software,2005,16(5):886-893.(in Chinese) 焦利,林宇,王文东,等.一种负载均衡网络中内部链路时延推测算法[J].软件学报,2005,16(5):886-893.
[27] YAO Y,CAI W.Ad Hoc Network Measurement Based on Network Tomography:Theory,Technique,and Application[J].Journal of Networks,2010,5(6):666-674.
[28] SHAH B,Trivedi B H.Artificial Neural Network based Intrusion Detection System:A Survey [J].International Journal of Computer Applications,2012,39(6):13-18.
[29] KAO B,TU N N,HWANG I,et al.Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks [J].Wireless Personal Communications,2012,66(2):473-488.
[30] The network simulator—ns-2 .[2014-9-21] http://www.isi.edu/nsnam/ns.
[31] HU Xi,WANG Xin,ZHANG Bin.Stability-oriented adaptive rou-ting overhead contral algorithm in MANETs[J].Computer Science,2014,41(3):100-104,123.(in Chinese) 胡曦,王鑫,张斌.MANETs面向稳定性的自适应路由开销控制算法[J].计算机科学,2014,41(3):100-104,123.
[32] FEENEY L M,NILSSON V.Investigating the energy consumption of a wireless network interface in an ad hoc networking environment [C]∥Proc.of the IEEE INFOCOM,Anchorage.AK,USA,2001.
[33] WANG Wei,WANG Hui-ran,WANG Bei-zhan,et al.Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks [J].Information Sciences,2013,220(1):580-602.
[34] JIANG Yi-bo,WANG Yu-chen,WANG Wan-liang,et al.Performance analysis method for instrusion detection in MANETs based on machine learning algorithms[J].Computer Science,2013,0(11A):170-191.(in Chinese) 蒋一波,王鱼晨,王万良,等.一种基于机器学习的MANET网络入侵检测性能评估方法研究[J].计算机科学,2013,40(11A):170-191.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .