Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1229285.1229329acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach

Published: 20 March 2007 Publication History

Abstract

Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propose a DoS mitigation technique that uses digital signatures to verify legitimate packets, and drop packets that do not pass the verification. Since nodes are selfish, they may not perform the verification so that they can avoid paying the overhead. A bad packet that escapes verification along the whole network path will bring a penalty to all its forwarders. A network game can be formulated in which nodes along a network path, in optimizing their own benefits, are encouraged to act collectively to filter out bad packets. Analytical results show that Nash equilibrium can be attained for players in the proposed game, in which significant benefits can be provided to forwarders such that many of the bad packets will be eliminated by verification.

References

[1]
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, 2002.
[2]
L. Buttyan and J. Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks. In Technical report, EPFL, 2001.
[3]
Y.-C. Hu, D. B. Johnson, and A. Perrig. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of Mobicom, 2002.
[4]
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of ICNP, 2001.

Cited By

View all
  • (2023)Mitigating DoS Attack in MANETs Considering Node Reputation with AIJournal of Network and Systems Management10.1007/s10922-023-09742-331:3Online publication date: 7-Jun-2023
  • (2022)Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc NetworkInternational journal of Computer Networks & Communications10.5121/ijcnc.2022.1460714:6(99-113)Online publication date: 30-Nov-2022
  • (2018)Comparing the throughput and delay of proactive and reactive routing protocols in mobile ad-hoc networks2018 2nd International Conference on Inventive Systems and Control (ICISC)10.1109/ICISC.2018.8399011(1278-1283)Online publication date: Jan-2018
  • Show More Cited By

Index Terms

  1. Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security
        March 2007
        323 pages
        ISBN:1595935746
        DOI:10.1145/1229285
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 20 March 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Qualifiers

        • Article

        Conference

        Asia CCS07
        Sponsor:

        Acceptance Rates

        ASIACCS '07 Paper Acceptance Rate 33 of 180 submissions, 18%;
        Overall Acceptance Rate 418 of 2,322 submissions, 18%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)3
        • Downloads (Last 6 weeks)1
        Reflects downloads up to 23 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)Mitigating DoS Attack in MANETs Considering Node Reputation with AIJournal of Network and Systems Management10.1007/s10922-023-09742-331:3Online publication date: 7-Jun-2023
        • (2022)Twin-Node Neighbour Attack on AODV based Wireless Ad Hoc NetworkInternational journal of Computer Networks & Communications10.5121/ijcnc.2022.1460714:6(99-113)Online publication date: 30-Nov-2022
        • (2018)Comparing the throughput and delay of proactive and reactive routing protocols in mobile ad-hoc networks2018 2nd International Conference on Inventive Systems and Control (ICISC)10.1109/ICISC.2018.8399011(1278-1283)Online publication date: Jan-2018
        • (2016)Securing Mobile Ad Hoc NetworksInternational Journal of Handheld Computing Research10.4018/IJHCR.20160101037:1(26-76)Online publication date: Jan-2016
        • (2016)Security Issues in Mobile Ad Hoc NetworksMobile Computing and Wireless Networks10.4018/978-1-4666-8751-6.ch086(1940-1985)Online publication date: 2016
        • (2014)Security Issues in Mobile Ad Hoc NetworksSecurity, Privacy, Trust, and Resource Management in Mobile and Wireless Communications10.4018/978-1-4666-4691-9.ch009(176-221)Online publication date: 2014
        • (2014)A survey of the mitigation methods against DoS attacks on MANETs2014 Science and Information Conference10.1109/SAI.2014.6918239(538-544)Online publication date: Aug-2014
        • (2011)Mitigate DoS and DDoS Attack in Mobile Ad Hoc NetworksInternational Journal of Digital Crime and Forensics10.4018/jdcf.20110101023:1(14-36)Online publication date: 1-Jan-2011
        • (2011)Multiplayer game for DDoS attacks resilience in ad hoc networks2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE)10.1109/WIRELESSVITAE.2011.5940931(1-5)Online publication date: Feb-2011
        • (2011)Detection of Denial of Service Attack Due to Selfish Node in MANET by Mobile AgentRecent Trends in Wireless and Mobile Networks10.1007/978-3-642-21937-5_2(14-23)Online publication date: 2011
        • Show More Cited By

        View Options

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media