Show simple item record

dc.contributor.authorPeng, Chaorong
dc.contributor.authorChen, Changwen
dc.date.accessioned2017-04-28T19:28:53Z
dc.date.available2017-04-28T19:28:53Z
dc.date.issued2008-04-03
dc.identifier.citationPeng, C., & Chen, C. W. (2008). IDMA: Improving the defense against malicious attack for mobile ad hoc networks based on the ARTP protocol. Paper presented at the Proceedings of SPIE - the International Society for Optical Engineering, 6982 doi:10.1117/12.783063en_US
dc.identifier.urihttp://hdl.handle.net/11141/1382
dc.description.abstractMalicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.en_US
dc.language.isoen_USen_US
dc.rightsThis published article is made available in accordance with publishers policy. It may be subject to U.S. copyright law.en_US
dc.rights.urihttp://spie.org/publications/journals/guidelines-for-authors#Terms_of_Useen_US
dc.titleIDMA: Improving the defense against malicious attack for Mobile Ad Hoc Networks based on the ARTP protocolen_US
dc.typeConference Proceedingen_US
dc.identifier.doi10.1117/12.783063


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record