Skip to main content

Control of DoS Attacks During Merging Process Over the Internet of Things

  • Conference paper
  • First Online:
Web, Artificial Intelligence and Network Applications (WAINA 2020)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1150))

  • 2306 Accesses

Abstract

Due to the rapid growth of using technologies, a new paradigm named the Internet of Things (IoT) occurs. In the IoT, different devices communicate and share data. MANET is an example of IoT where devices communicate together. A Mobile ad hoc Network (MANET) is an easy set up network that consists of a group of nodes. However, MANET with its nature as dynamic topology becomes vulnerable to attacks. A Denial of Service attack (DoS) occurs in MANET and aims to prevent legitimate users from access to their legitimate services. Thus, the network performance will be deteriorated. The dynamic topology in MANET enables nodes to join or leave the network frequently. Thus, the chance of MANETs merge happens. In this article, the Merging using (Monitoring; Detection, and Rehabilitation) MrDR (MUMrDR) is used to detect DoS attacks based on decentralised trust concept. The Network Simulator (NS2) is used to simulate the experiment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bujari, A., et al.: Standards, security and business models: key challenges for the IoT scenario. Mob. Netw. Appl. 1–8 (2017)

    Google Scholar 

  2. Rath, M., Panigrahi, C.R.: Prioritization of security measures at the junction of MANET and IoT. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies. ACM (2016)

    Google Scholar 

  3. Chitkara, M., Ahmad, M.W.: Review on MANET: characteristics, challenges, imperatives and routing protocols. Int. J. Comput. Sci. Mob. Comput. 3(2), 432–437 (2014)

    Google Scholar 

  4. Su, W., Gerla, M., de Verdiere, A.C.: Mobile Ad hoc networking (MANET) Y. Yi internet-draft S. Lee intended status: experimental University of California, Los Expires: September 6, 2014 Angeles (2014)

    Google Scholar 

  5. Singh, M., Sarangal, M., Singh, G.: Review of MANET: applications & challenges. Netw. Commun. Eng. 6(5), 193–197 (2014)

    Google Scholar 

  6. Yadav, N., Sharma, D.: MANET: mobile ad-hoc network its characteristics, challenges, application and security attacks (2015)

    Google Scholar 

  7. Conti, M., Giordano, S.: Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Commun. Mag. 52(1), 85–96 (2014)

    Article  Google Scholar 

  8. Sandeep, A.S., Bakal, J.: Review on DDoS attack traceback mechanism in MANET (2014)

    Google Scholar 

  9. Jia, Q., Sun, K., Stavrou, A.: Capability-based defenses against DoS attacks in multi-path MANET communications. Wirel. Pers. Commun. 73(1), 127–148 (2013)

    Article  Google Scholar 

  10. Sorathiya, D., Rathod, H.: Algorithm to detect and recover wormhole attack in MANETs. Int. J. Comput. Appl. 124(14) (2015)

    Google Scholar 

  11. Singh, A., Dua, T.S.: Mobile ad-hoc networks routing protocol and its challenges: a survey. Int. J. Comput. Appl. 108(1) (2014)

    Google Scholar 

  12. Zain, A., et al.: MANETs performance analysis with dos attack at different routing protocols. Int. J. Eng. Technol. 4(2), 390–398 (2015)

    Article  Google Scholar 

  13. Alsumayt, A., Haggerty, J., Lotfi, A.: Comparison of the MrDR method against different DoS attacks in MANETs. In: 2015 Fifth International Conference on Digital Information Processing and Communications (ICDIPC). IEEE (2015)

    Google Scholar 

  14. Jhaveri, R.H., Patel, S.J., Jinwala, D.C.: Dos attacks in mobile ad hoc networks: a survey. In: 2012 Second International Conference on Advanced Computing and Communication Technologies (ACCT). IEEE (2012)

    Google Scholar 

  15. Patel, A., Patel, N., Patel, R.: Defending against Wormhole Attack in MANET. In: 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE (2015)

    Google Scholar 

  16. Patel, A.D., Chawda, K.: Dual security against grayhole attack in MANETs. In: Intelligent Computing, Communication and Devices, pp. 33–37. Springer (2015)

    Google Scholar 

  17. Akram, S., Zubair, I., Islam, M.: Fully distributed dynamically configurable firewall to resist DOS attacks in MANET. In: First International Conference on Networked Digital Technologies, NDT 2009. IEEE (2009)

    Google Scholar 

  18. Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: INFOCOM 2003 Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. IEEE (2003)

    Google Scholar 

  19. Alsumayt, A., Haggerty, J., Lotfi, A.: Detect DoS attack using MrDR method in merging two MANETs. In: 2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE (2016)

    Google Scholar 

  20. Alsumayt, A., Haggerty, J.: Using trust based method to detect DoS attack in MANETs (2014)

    Google Scholar 

  21. Alsumayt, A., Haggerty, J., Lotfi, A.: Performance, analysis, and comparison of MrDR method to detect DoS attacks in MANET. In: 2015 European Intelligence and Security Informatics Conference (EISIC). IEEE (2015)

    Google Scholar 

  22. Alsumayt, A., Haggerty, J., Lotfi, A.: Using trust to detect denial of service attacks in the internet of things over MANETs. Int. J. Space-Based Situat. Comput. (IJSSC) 7, 43–56 (2017)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Albandari Alsumayt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alsumayt, A. (2020). Control of DoS Attacks During Merging Process Over the Internet of Things. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds) Web, Artificial Intelligence and Network Applications. WAINA 2020. Advances in Intelligent Systems and Computing, vol 1150. Springer, Cham. https://doi.org/10.1007/978-3-030-44038-1_75

Download citation

Publish with us

Policies and ethics