Abstract
A Distributed Denial of Service (DDoS) attacks are used by malicious nodes in order to flood a victim node with large data flows. When the victim is a communication node, these attacks aim to damage network performances by reducing its resources such as bandwidth (bandwidth depletion attack), computing power (processor depletion attack) and energy (energy depletion attack). Due to their proper characteristics (wireless and dynamic topologies, low battery life, etc.), Mobile Ad hoc NETworks (MANETs) are more vulnerable than other networks and their damages can quickly became very serious. Moreover, for such networks, the energy depletion attack is obviously the most common because it makes nodes unable to process legitimate requests and traffic. It follows that for MANETs, for which such attack can be completely disabling, it is better to prevent this type of attack rather than reacting after its occurrence. The aim of this paper fits into the previous strategy: it proposes as a first part, a security mechanism preventing energy depletion attack which ties up the residual energy of a victim MANET node making it unable to process legitimate requests and consequently the needed service. The environment on which the proposition is made uses the delegation concept and extends a recently proposed reputation based clustering MANET environment organizing the network into clusters with elected cluster heads (CHs) and detecting and isolating malicious nodes.The second part of this paper concerns the formal specification of the proposed mechanism based on a certain number of constraints and its verification using adequate algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kaushik, S., Kaushik, M.: Analysis of MANET security, architecture and assessment. Int. J. Electron. Comput. Sci. Eng. (IJECSE) 1(2), 787–793 (2012). ISSN 2277–1956
Geetika, N.K.: Detection and prevention algorithms of DDOS attack in MANETs. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(8), 61–65 (2013)
Chhabra, M., Gupta, B., Almomani, A.: A novel solution to handle DDOS attack in MANET. J. Inf. Secur. 4(3), 165–179 (2013)
Sinha, S.K., Singh, R.K., Pandey, K.K., Sahu, M.K.: Distributed denial of service attack prevention using critical link method in MANET. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARCSEE) 2(3), 325 (2013)
Ahirwal, R., Mahour, L.: Analysis of DDoS attack effect and protection scheme in wireless mobile ad-hoc networks. Int. J. Comput. Sci. Eng. (IJCSE) 4(6), 1164 (2012)
Arunmozhi, S.A., Venkataramani, Y.: A flow monitoring scheme to defend reduction-of-quality (RoQ) attacks in mobile ad-hoc networks. Inf. Secur. J. Global Perspect. 19(5), 263–272 (2010)
Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S.: A reputation-based clustering mechanism for MANET routing security. In: Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, September 2013
Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S.: Towards the definition of a mobility-based clustering environment for MANET. In: Proceedings of the Ninth International Conference on Wireless and Mobile Communications (ICWMC), Nice, France, August 2013
Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S.: A model for specification and validation of a trust management based security scheme in a MANET environment. In: Proceedings of the 4th International Workshop on Security of Mobile Applications (IWSMA), ARES, Toulouse, France, August 2015
Abassi, R., Guemara El Fatmi, S.: Dealing with delegation in a trust-based MANET. In: Proceedings of the IEEE 20th International Conference on Telecommunications (ICT) (2013)
Abassi, R., Guemara El Fatmi, S.: Delegation management modeling in a security policy based environment. In: Symbolic Computation in Software Science (SCSS) (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S. (2016). Toward Securing MANET Against the Energy Depletion Attack. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-31811-0_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31810-3
Online ISBN: 978-3-319-31811-0
eBook Packages: Computer ScienceComputer Science (R0)