Abstract
Due to the rapid growth of using technologies, a new paradigm named the Internet of Things (IoT) occurs. In the IoT, different devices communicate and share data. MANET is an example of IoT where devices communicate together. A Mobile ad hoc Network (MANET) is an easy set up network that consists of a group of nodes. However, MANET with its nature as dynamic topology becomes vulnerable to attacks. A Denial of Service attack (DoS) occurs in MANET and aims to prevent legitimate users from access to their legitimate services. Thus, the network performance will be deteriorated. The dynamic topology in MANET enables nodes to join or leave the network frequently. Thus, the chance of MANETs merge happens. In this article, the Merging using (Monitoring; Detection, and Rehabilitation) MrDR (MUMrDR) is used to detect DoS attacks based on decentralised trust concept. The Network Simulator (NS2) is used to simulate the experiment.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bujari, A., et al.: Standards, security and business models: key challenges for the IoT scenario. Mob. Netw. Appl. 1–8 (2017)
Rath, M., Panigrahi, C.R.: Prioritization of security measures at the junction of MANET and IoT. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. ACM (2016)
Chitkara, M., Ahmad, M.W.: Review on MANET: characteristics, challenges, imperatives and routing protocols. Int. J. Comput. Sci. Mob. Comput. 3(2), 432–437 (2014)
Su, W., Gerla, M., de Verdiere, A.C.: Mobile Ad hoc networking (MANET) Y. Yi internet-draft S. Lee intended status: experimental University of California, Los Expires: September 6, 2014 Angeles (2014)
Singh, M., Sarangal, M., Singh, G.: Review of MANET: applications & challenges. Netw. Commun. Eng. 6(5), 193–197 (2014)
Yadav, N., Sharma, D.: MANET: mobile ad-hoc network its characteristics, challenges, application and security attacks (2015)
Conti, M., Giordano, S.: Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)
Sandeep, A.S., Bakal, J.: Review on DDoS attack traceback mechanism in MANET (2014)
Jia, Q., Sun, K., Stavrou, A.: Capability-based defenses against DoS attacks in multi-path MANET communications. Wirel. Pers. Commun. 73(1), 127–148 (2013)
Sorathiya, D., Rathod, H.: Algorithm to detect and recover wormhole attack in MANETs. Int. J. Comput. Appl. 124(14) (2015)
Singh, A., Dua, T.S.: Mobile ad-hoc networks routing protocol and its challenges: a survey. Int. J. Comput. Appl. 108(1) (2014)
Zain, A., et al.: MANETs performance analysis with dos attack at different routing protocols. Int. J. Eng. Technol. 4(2), 390–398 (2015)
Alsumayt, A., Haggerty, J., Lotfi, A.: Comparison of the MrDR method against different DoS attacks in MANETs. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC). IEEE (2015)
Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: Dos attacks in mobile ad hoc networks: a survey. In: 2012 Second International Conference on Advanced Computing and Communication Technologies (ACCT). IEEE (2012)
Patel, A., Patel, N., Patel, R.: Defending against Wormhole Attack in MANET. In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE (2015)
Patel, A.D., Chawda, K.: Dual security against grayhole attack in MANETs. In: Intelligent Computing, Communication and Devices, pp. 33–37. Springer (2015)
Akram, S., Zubair, I., Islam, M.: Fully distributed dynamically configurable firewall to resist DOS attacks in MANET. In: First International Conference on Networked Digital Technologies, NDT 2009. IEEE (2009)
Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. IEEE (2003)
Alsumayt, A., Haggerty, J., Lotfi, A.: Detect DoS attack using MrDR method in merging two MANETs. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2016)
Alsumayt, A., Haggerty, J.: Using trust based method to detect DoS attack in MANETs (2014)
Alsumayt, A., Haggerty, J., Lotfi, A.: Performance, analysis, and comparison of MrDR method to detect DoS attacks in MANET. In: 2015 European Intelligence and Security Informatics Conference (EISIC). IEEE (2015)
Alsumayt, A., Haggerty, J., Lotfi, A.: Using trust to detect denial of service attacks in the internet of things over MANETs. Int. J. Space-Based Situat. Comput. (IJSSC) 7, 43–56 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Alsumayt, A. (2020). Control of DoS Attacks During Merging Process Over the Internet of Things. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_75
Download citation
DOI: https://doi.org/10.1007/978-3-030-44038-1_75
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-44037-4
Online ISBN: 978-3-030-44038-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)