Loading…

An effective method to mitigate route query floods in MANETs

In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper...

Full description

Saved in:
Bibliographic Details
Main Authors: Ai-Fen Sui, Dai Fei Guo, Dong-Sheng Zhao
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 713
container_issue
container_start_page 709
container_title
container_volume
creator Ai-Fen Sui
Dai Fei Guo
Dong-Sheng Zhao
description In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.
doi_str_mv 10.1109/ICCT.2011.6157968
format conference_proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6157968</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6157968</ieee_id><sourcerecordid>6157968</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-b42b7a9ee7def237d007e5e9dc91c991d8019f1261cbdca2b529d1dbd22cccf43</originalsourceid><addsrcrecordid>eNpFj1FLwzAUhSMiqNt-gPiSP9CamzZpL_hSytTBdC99H01yo5F11SYT9u8dOPA8nI_z8sFh7A5EDiDwYdW2XS4FQK5BVajrC3YLGmRdFkKJy_-h8ZotYvwUp2hdI6gb9tjsOXlPNoUf4gOlj9HxNPIhpPDeJ-LTeDj194GmI_e7cXSRhz1_bd6WXZyzK9_vIi3OnLHuadm1L9l687xqm3UWUKTMlNJUPRJVjrwsKidERYrQWQSLCK4WgB6kBmuc7aVREh0446S01vqymLH7P20gou3XFIZ-Om7PZ4tfS0VIbQ</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An effective method to mitigate route query floods in MANETs</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Ai-Fen Sui ; Dai Fei Guo ; Dong-Sheng Zhao</creator><creatorcontrib>Ai-Fen Sui ; Dai Fei Guo ; Dong-Sheng Zhao</creatorcontrib><description>In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.</description><identifier>ISBN: 1612843069</identifier><identifier>ISBN: 9781612843063</identifier><identifier>EISBN: 1612843050</identifier><identifier>EISBN: 9781612843070</identifier><identifier>EISBN: 9781612843056</identifier><identifier>EISBN: 1612843077</identifier><identifier>DOI: 10.1109/ICCT.2011.6157968</identifier><language>eng</language><publisher>IEEE</publisher><subject>Ad hoc networks ; Floods ; Mobile computing ; Radiation detectors ; Routing protocols ; Throughput ; Upper bound</subject><ispartof>2011 IEEE 13th International Conference on Communication Technology, 2011, p.709-713</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6157968$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6157968$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Ai-Fen Sui</creatorcontrib><creatorcontrib>Dai Fei Guo</creatorcontrib><creatorcontrib>Dong-Sheng Zhao</creatorcontrib><title>An effective method to mitigate route query floods in MANETs</title><title>2011 IEEE 13th International Conference on Communication Technology</title><addtitle>ICCT</addtitle><description>In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.</description><subject>Ad hoc networks</subject><subject>Floods</subject><subject>Mobile computing</subject><subject>Radiation detectors</subject><subject>Routing protocols</subject><subject>Throughput</subject><subject>Upper bound</subject><isbn>1612843069</isbn><isbn>9781612843063</isbn><isbn>1612843050</isbn><isbn>9781612843070</isbn><isbn>9781612843056</isbn><isbn>1612843077</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNpFj1FLwzAUhSMiqNt-gPiSP9CamzZpL_hSytTBdC99H01yo5F11SYT9u8dOPA8nI_z8sFh7A5EDiDwYdW2XS4FQK5BVajrC3YLGmRdFkKJy_-h8ZotYvwUp2hdI6gb9tjsOXlPNoUf4gOlj9HxNPIhpPDeJ-LTeDj194GmI_e7cXSRhz1_bd6WXZyzK9_vIi3OnLHuadm1L9l687xqm3UWUKTMlNJUPRJVjrwsKidERYrQWQSLCK4WgB6kBmuc7aVREh0446S01vqymLH7P20gou3XFIZ-Om7PZ4tfS0VIbQ</recordid><startdate>201109</startdate><enddate>201109</enddate><creator>Ai-Fen Sui</creator><creator>Dai Fei Guo</creator><creator>Dong-Sheng Zhao</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201109</creationdate><title>An effective method to mitigate route query floods in MANETs</title><author>Ai-Fen Sui ; Dai Fei Guo ; Dong-Sheng Zhao</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-b42b7a9ee7def237d007e5e9dc91c991d8019f1261cbdca2b529d1dbd22cccf43</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Ad hoc networks</topic><topic>Floods</topic><topic>Mobile computing</topic><topic>Radiation detectors</topic><topic>Routing protocols</topic><topic>Throughput</topic><topic>Upper bound</topic><toplevel>online_resources</toplevel><creatorcontrib>Ai-Fen Sui</creatorcontrib><creatorcontrib>Dai Fei Guo</creatorcontrib><creatorcontrib>Dong-Sheng Zhao</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Ai-Fen Sui</au><au>Dai Fei Guo</au><au>Dong-Sheng Zhao</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An effective method to mitigate route query floods in MANETs</atitle><btitle>2011 IEEE 13th International Conference on Communication Technology</btitle><stitle>ICCT</stitle><date>2011-09</date><risdate>2011</risdate><spage>709</spage><epage>713</epage><pages>709-713</pages><isbn>1612843069</isbn><isbn>9781612843063</isbn><eisbn>1612843050</eisbn><eisbn>9781612843070</eisbn><eisbn>9781612843056</eisbn><eisbn>1612843077</eisbn><abstract>In multi-hop MANETs, each node acts as an end node as well as a router for other nodes. Routing protocols maybe mis-used to launch denial-of-service attacks. The classic countermeasures by controlling route query rate is difficult to implement when the MANET topology change frequently. In this paper, an effective method to mitigate route query floods is proposed. Each node sets an upper bound number for the storage of the resulting (partial) routes with respect to route queries received from one source node. The simulation results show that, when the bound selected properly, route query floods can be mitigated efficiently. The Packet Deliver Rate (PDR) can reach that without attacks and route overhead can be reduced dramatically. At the same time, the method maintains network throughput when there are no malicious nodes.</abstract><pub>IEEE</pub><doi>10.1109/ICCT.2011.6157968</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 1612843069
ispartof 2011 IEEE 13th International Conference on Communication Technology, 2011, p.709-713
issn
language eng
recordid cdi_ieee_primary_6157968
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Ad hoc networks
Floods
Mobile computing
Radiation detectors
Routing protocols
Throughput
Upper bound
title An effective method to mitigate route query floods in MANETs
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T09%3A51%3A06IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20effective%20method%20to%20mitigate%20route%20query%20floods%20in%20MANETs&rft.btitle=2011%20IEEE%2013th%20International%20Conference%20on%20Communication%20Technology&rft.au=Ai-Fen%20Sui&rft.date=2011-09&rft.spage=709&rft.epage=713&rft.pages=709-713&rft.isbn=1612843069&rft.isbn_list=9781612843063&rft_id=info:doi/10.1109/ICCT.2011.6157968&rft.eisbn=1612843050&rft.eisbn_list=9781612843070&rft.eisbn_list=9781612843056&rft.eisbn_list=1612843077&rft_dat=%3Cieee_6IE%3E6157968%3C/ieee_6IE%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-b42b7a9ee7def237d007e5e9dc91c991d8019f1261cbdca2b529d1dbd22cccf43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6157968&rfr_iscdi=true