INSIGNIA: an IP-based quality of service framework for mobile ad Hoc networks
Journal of Parallel and Distributed Computing - Special issue on wireless and mobile computing and communications
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Preserving quality of service guarantees in spite of flow aggregation
IEEE/ACM Transactions on Networking (TON)
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
IEEE Transactions on Mobile Computing
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
A Denial-of-Service Resistant Quality-of-Service Signaling Protocol for Mobile Ad Hoc Networks
Proceedings of the Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks
SCAN: self-organized network-layer security in mobile ad hoc networks
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Mobile ad hoc networks are especially susceptible to denial-of-service attacks due to the lack of infrastructure, the imperfections of the wireless channel, and the limitations of the mobile devices. In principle, providing quality-of-service and resistance against flooding attacks can be achieved with per-flow management. However, a per-flow management scheme makes a mobile device vulnerable to state table exhaustion attacks. To avoid such attacks some degree of flow aggregation is necessary, but such aggregation tends to have a negative impact on flow fairness. We introduce a quantitative metric for the fairness experienced by a flow in the presence of flooding attacks and develop a model to study the impact of flow aggregation on the fairness experienced by a flow in the presence of flooding attacks. We propose a dynamic 3-level flow aggregation scheme, which is able to maintain a high degree of flow fairness even with a relatively small state table size. Our simulation results quantify the impact of flooding attacks on flow fairness and validate the effectiveness of the proposed flow aggregation scheme.