A distributed security scheme for ad hoc networks
In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed fo...
Gespeichert in:
Veröffentlicht in: | Crossroads (Association for Computing Machinery) 2004-09, Vol.11 (1), p.5-5 |
---|---|
Hauptverfasser: | , , , , , , |
Format: | Artikel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 5 |
---|---|
container_issue | 1 |
container_start_page | 5 |
container_title | Crossroads (Association for Computing Machinery) |
container_volume | 11 |
creator | Gada, Dhaval Gogri, Rajat Rathod, Punit Dedhia, Zalak Mody, Nirali Sanyal, Sugata Abraham, Ajith |
description | In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results. |
doi_str_mv | 10.1145/1031859.1031864 |
format | Article |
fullrecord | <record><control><sourceid>crossref</sourceid><recordid>TN_cdi_crossref_primary_10_1145_1031859_1031864</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>10_1145_1031859_1031864</sourcerecordid><originalsourceid>FETCH-LOGICAL-c864-437b518f7b1f866c09dc743eacfae6bde5b58e08a198d15f9343e605f9d6c6253</originalsourceid><addsrcrecordid>eNo9j0tLAzEUhYMoWGvXbvMHps2d5GYyy1J8QcFN9yGPGzrVOpJMkf57Rx26Oh8cOIePsQcQSwCFKxASDLbLv9Tqis0Aa1Op1ojrCzf1Lbsr5SAEoAacMVjz2JUhd_40UOSFwil3w5mXsKcj8dRn7iLf94F_0vDd5_dyz26S-yi0mHLOdk-Pu81LtX17ft2st1UY3yslG49gUuMhGa2DaGNolCQXkiPtI6FHQ8I4aE0ETK0cSy1GiDroGuWcrf5nQ-5LyZTsV-6OLp8tCPsrbCdhOwnLH5qvR6M</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>A distributed security scheme for ad hoc networks</title><source>ACM Digital Library Complete</source><creator>Gada, Dhaval ; Gogri, Rajat ; Rathod, Punit ; Dedhia, Zalak ; Mody, Nirali ; Sanyal, Sugata ; Abraham, Ajith</creator><creatorcontrib>Gada, Dhaval ; Gogri, Rajat ; Rathod, Punit ; Dedhia, Zalak ; Mody, Nirali ; Sanyal, Sugata ; Abraham, Ajith</creatorcontrib><description>In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.</description><identifier>ISSN: 1528-4972</identifier><identifier>EISSN: 1528-4980</identifier><identifier>DOI: 10.1145/1031859.1031864</identifier><language>eng</language><ispartof>Crossroads (Association for Computing Machinery), 2004-09, Vol.11 (1), p.5-5</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c864-437b518f7b1f866c09dc743eacfae6bde5b58e08a198d15f9343e605f9d6c6253</citedby><cites>FETCH-LOGICAL-c864-437b518f7b1f866c09dc743eacfae6bde5b58e08a198d15f9343e605f9d6c6253</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27923,27924</link.rule.ids></links><search><creatorcontrib>Gada, Dhaval</creatorcontrib><creatorcontrib>Gogri, Rajat</creatorcontrib><creatorcontrib>Rathod, Punit</creatorcontrib><creatorcontrib>Dedhia, Zalak</creatorcontrib><creatorcontrib>Mody, Nirali</creatorcontrib><creatorcontrib>Sanyal, Sugata</creatorcontrib><creatorcontrib>Abraham, Ajith</creatorcontrib><title>A distributed security scheme for ad hoc networks</title><title>Crossroads (Association for Computing Machinery)</title><description>In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.</description><issn>1528-4972</issn><issn>1528-4980</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2004</creationdate><recordtype>article</recordtype><recordid>eNo9j0tLAzEUhYMoWGvXbvMHps2d5GYyy1J8QcFN9yGPGzrVOpJMkf57Rx26Oh8cOIePsQcQSwCFKxASDLbLv9Tqis0Aa1Op1ojrCzf1Lbsr5SAEoAacMVjz2JUhd_40UOSFwil3w5mXsKcj8dRn7iLf94F_0vDd5_dyz26S-yi0mHLOdk-Pu81LtX17ft2st1UY3yslG49gUuMhGa2DaGNolCQXkiPtI6FHQ8I4aE0ETK0cSy1GiDroGuWcrf5nQ-5LyZTsV-6OLp8tCPsrbCdhOwnLH5qvR6M</recordid><startdate>200409</startdate><enddate>200409</enddate><creator>Gada, Dhaval</creator><creator>Gogri, Rajat</creator><creator>Rathod, Punit</creator><creator>Dedhia, Zalak</creator><creator>Mody, Nirali</creator><creator>Sanyal, Sugata</creator><creator>Abraham, Ajith</creator><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>200409</creationdate><title>A distributed security scheme for ad hoc networks</title><author>Gada, Dhaval ; Gogri, Rajat ; Rathod, Punit ; Dedhia, Zalak ; Mody, Nirali ; Sanyal, Sugata ; Abraham, Ajith</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c864-437b518f7b1f866c09dc743eacfae6bde5b58e08a198d15f9343e605f9d6c6253</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2004</creationdate><toplevel>online_resources</toplevel><creatorcontrib>Gada, Dhaval</creatorcontrib><creatorcontrib>Gogri, Rajat</creatorcontrib><creatorcontrib>Rathod, Punit</creatorcontrib><creatorcontrib>Dedhia, Zalak</creatorcontrib><creatorcontrib>Mody, Nirali</creatorcontrib><creatorcontrib>Sanyal, Sugata</creatorcontrib><creatorcontrib>Abraham, Ajith</creatorcontrib><collection>CrossRef</collection><jtitle>Crossroads (Association for Computing Machinery)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gada, Dhaval</au><au>Gogri, Rajat</au><au>Rathod, Punit</au><au>Dedhia, Zalak</au><au>Mody, Nirali</au><au>Sanyal, Sugata</au><au>Abraham, Ajith</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>A distributed security scheme for ad hoc networks</atitle><jtitle>Crossroads (Association for Computing Machinery)</jtitle><date>2004-09</date><risdate>2004</risdate><volume>11</volume><issue>1</issue><spage>5</spage><epage>5</epage><pages>5-5</pages><issn>1528-4972</issn><eissn>1528-4980</eissn><abstract>In an ad hoc wireless network where wired infrastructures are not feasible, energy and bandwidth conservation are the two key elements presenting challenges to researchers. Limited bandwidth makes a network easily congested by the control signals of the routing protocol. Routing schemes developed for wired networks seldom consider restrictions of this type. Instead, they assume that the network is mostly stable and that the overhead for routing messages is negligible. Considering these differences between wired and wireless network, it is necessary to develop a wireless routing protocol that limits congestion in the network [1, 5, 8, 9, 10, 11].This paper proposes minor modifications to the existing Ad hoc On Demand Vector (AODV) routing protocol (RFC 3561) in order to restrict congestion in networks during a particular type of Denial of Service (DoS) attack. In addition to this, it incurs absolutely no additional overhead [4]. We describe the DoS attack caused due to Route Request (RREQ) flooding and its implications on existing AODV-driven Mobile Ad hoc Networks (MANET) [2, 14]. To combat this DoS attack, a proactive scheme [12] is proposed. We present an illustration to describe the implications of RREQ flooding on pure AODV and the modified AODV protocols. To quantify the effectiveness of the proposed scheme, we simulated a DoS [6] attack in a mobile environment and study the performance results.</abstract><doi>10.1145/1031859.1031864</doi><tpages>1</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1528-4972 |
ispartof | Crossroads (Association for Computing Machinery), 2004-09, Vol.11 (1), p.5-5 |
issn | 1528-4972 1528-4980 |
language | eng |
recordid | cdi_crossref_primary_10_1145_1031859_1031864 |
source | ACM Digital Library Complete |
title | A distributed security scheme for ad hoc networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T08%3A36%3A26IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=A%20distributed%20security%20scheme%20for%20ad%20hoc%20networks&rft.jtitle=Crossroads%20(Association%20for%20Computing%20Machinery)&rft.au=Gada,%20Dhaval&rft.date=2004-09&rft.volume=11&rft.issue=1&rft.spage=5&rft.epage=5&rft.pages=5-5&rft.issn=1528-4972&rft.eissn=1528-4980&rft_id=info:doi/10.1145/1031859.1031864&rft_dat=%3Ccrossref%3E10_1145_1031859_1031864%3C/crossref%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |