Loading…
An effective method to mitigate route query floods in MANETs
In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 713 |
container_issue | |
container_start_page | 709 |
container_title | |
container_volume | |
creator | Ai-Fen Sui Dai Fei Guo Dong-Sheng Zhao |
description | In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes. |
doi_str_mv | 10.1109/ICCT.2011.6157968 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6157968</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6157968</ieee_id><sourcerecordid>6157968</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-b42b7a9ee7def237d007e5e9dc91c991d8019f1261cbdca2b529d1dbd22cccf43</originalsourceid><addsrcrecordid>eNpFj1FLwzAUhSMiqNt-gPiSP9CamzZpL_hSytTBdC99H01yo5F11SYT9u8dOPA8nI_z8sFh7A5EDiDwYdW2XS4FQK5BVajrC3YLGmRdFkKJy_-h8ZotYvwUp2hdI6gb9tjsOXlPNoUf4gOlj9HxNPIhpPDeJ-LTeDj194GmI_e7cXSRhz1_bd6WXZyzK9_vIi3OnLHuadm1L9l687xqm3UWUKTMlNJUPRJVjrwsKidERYrQWQSLCK4WgB6kBmuc7aVREh0446S01vqymLH7P20gou3XFIZ-Om7PZ4tfS0VIbQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An effective method to mitigate route query floods in MANETs</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ai-Fen Sui ; Dai Fei Guo ; Dong-Sheng Zhao</creator><creatorcontrib>Ai-Fen Sui ; Dai Fei Guo ; Dong-Sheng Zhao</creatorcontrib><description>In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.</description><identifier>ISBN: 1612843069</identifier><identifier>ISBN: 9781612843063</identifier><identifier>EISBN: 1612843050</identifier><identifier>EISBN: 9781612843070</identifier><identifier>EISBN: 9781612843056</identifier><identifier>EISBN: 1612843077</identifier><identifier>DOI: 10.1109/ICCT.2011.6157968</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Floods ; Mobile computing ; Radiation detectors ; Routing protocols ; Throughput ; Upper bound</subject><ispartof>2011 IEEE 13th International Conference on Communication Technology, 2011, p.709-713</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6157968$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6157968$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ai-Fen Sui</creatorcontrib><creatorcontrib>Dai Fei Guo</creatorcontrib><creatorcontrib>Dong-Sheng Zhao</creatorcontrib><title>An effective method to mitigate route query floods in MANETs</title><title>2011 IEEE 13th International Conference on Communication Technology</title><addtitle>ICCT</addtitle><description>In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.</description><subject>Ad hoc networks</subject><subject>Floods</subject><subject>Mobile computing</subject><subject>Radiation detectors</subject><subject>Routing protocols</subject><subject>Throughput</subject><subject>Upper bound</subject><isbn>1612843069</isbn><isbn>9781612843063</isbn><isbn>1612843050</isbn><isbn>9781612843070</isbn><isbn>9781612843056</isbn><isbn>1612843077</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFj1FLwzAUhSMiqNt-gPiSP9CamzZpL_hSytTBdC99H01yo5F11SYT9u8dOPA8nI_z8sFh7A5EDiDwYdW2XS4FQK5BVajrC3YLGmRdFkKJy_-h8ZotYvwUp2hdI6gb9tjsOXlPNoUf4gOlj9HxNPIhpPDeJ-LTeDj194GmI_e7cXSRhz1_bd6WXZyzK9_vIi3OnLHuadm1L9l687xqm3UWUKTMlNJUPRJVjrwsKidERYrQWQSLCK4WgB6kBmuc7aVREh0446S01vqymLH7P20gou3XFIZ-Om7PZ4tfS0VIbQ</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Ai-Fen Sui</creator><creator>Dai Fei Guo</creator><creator>Dong-Sheng Zhao</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>An effective method to mitigate route query floods in MANETs</title><author>Ai-Fen Sui ; Dai Fei Guo ; Dong-Sheng Zhao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-b42b7a9ee7def237d007e5e9dc91c991d8019f1261cbdca2b529d1dbd22cccf43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Ad hoc networks</topic><topic>Floods</topic><topic>Mobile computing</topic><topic>Radiation detectors</topic><topic>Routing protocols</topic><topic>Throughput</topic><topic>Upper bound</topic><toplevel>online_resources</toplevel><creatorcontrib>Ai-Fen Sui</creatorcontrib><creatorcontrib>Dai Fei Guo</creatorcontrib><creatorcontrib>Dong-Sheng Zhao</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ai-Fen Sui</au><au>Dai Fei Guo</au><au>Dong-Sheng Zhao</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An effective method to mitigate route query floods in MANETs</atitle><btitle>2011 IEEE 13th International Conference on Communication Technology</btitle><stitle>ICCT</stitle><date>2011-09</date><risdate>2011</risdate><spage>709</spage><epage>713</epage><pages>709-713</pages><isbn>1612843069</isbn><isbn>9781612843063</isbn><eisbn>1612843050</eisbn><eisbn>9781612843070</eisbn><eisbn>9781612843056</eisbn><eisbn>1612843077</eisbn><abstract>In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.</abstract><pub>IEEE</pub><doi>10.1109/ICCT.2011.6157968</doi><tpages>5</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 1612843069 |
ispartof | 2011 IEEE 13th International Conference on Communication Technology, 2011, p.709-713 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6157968 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Ad hoc networks Floods Mobile computing Radiation detectors Routing protocols Throughput Upper bound |
title | An effective method to mitigate route query floods in MANETs |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T09%3A51%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20effective%20method%20to%20mitigate%20route%20query%20floods%20in%20MANETs&rft.btitle=2011%20IEEE%2013th%20International%20Conference%20on%20Communication%20Technology&rft.au=Ai-Fen%20Sui&rft.date=2011-09&rft.spage=709&rft.epage=713&rft.pages=709-713&rft.isbn=1612843069&rft.isbn_list=9781612843063&rft_id=info:doi/10.1109/ICCT.2011.6157968&rft.eisbn=1612843050&rft.eisbn_list=9781612843070&rft.eisbn_list=9781612843056&rft.eisbn_list=1612843077&rft_dat=%3Cieee_6IE%3E6157968%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-b42b7a9ee7def237d007e5e9dc91c991d8019f1261cbdca2b529d1dbd22cccf43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6157968&rfr_iscdi=true |