1. Attack containment in mobile ad-hoc networks through fair distribution of processing resources
- Author
-
Farzana Azam, Khaled Alghathbar, Muhammad Sher, Zeeshan Shafi Khan, and Muhammad Khurram Khan
- Subjects
Fair share ,Computer science ,Fair distribution ,business.industry ,Wireless ad hoc network ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Network simulator 2 ,Mobile ad hoc network ,Computer security ,computer.software_genre ,Flooding (computer networking) ,Electrical and Electronic Engineering ,business ,Computer communication networks ,computer ,Computer network - Abstract
Due to frequent joining and leaving of nodes and better performance, use of flooding algorithms is always proffered in Mobile Ad-hoc Networks (MANETs). A single query transmitted by a node can be received by hundreds of nodes at 3rd or 4th hop. But it is also fact that flooding algorithms provide an opportunity to attackers for launching query flooding attacks. On one side these query flooding attacks results in wastage of valuable processing resources and on the other side they cause in starvation and delay at legitimate user's end. To solve this problem we proposed attack containment techniques by providing a fair share of processing resources to every node. Fair distribution is achieved by designing different query distribution techniques based on mathematical models. Results obtained through network simulator 2 prove that the proposed solution is resilient against various types of flooding attacks.
- Published
- 2013