Skip to main content

Toward Securing MANET Against the Energy Depletion Attack

  • Conference paper
  • First Online:
Risks and Security of Internet and Systems (CRiSIS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 9572))

Included in the following conference series:

  • 1004 Accesses

Abstract

A Distributed Denial of Service (DDoS) attacks are used by malicious nodes in order to flood a victim node with large data flows. When the victim is a communication node, these attacks aim to damage network performances by reducing its resources such as bandwidth (bandwidth depletion attack), computing power (processor depletion attack) and energy (energy depletion attack). Due to their proper characteristics (wireless and dynamic topologies, low battery life, etc.), Mobile Ad hoc NETworks (MANETs) are more vulnerable than other networks and their damages can quickly became very serious. Moreover, for such networks, the energy depletion attack is obviously the most common because it makes nodes unable to process legitimate requests and traffic. It follows that for MANETs, for which such attack can be completely disabling, it is better to prevent this type of attack rather than reacting after its occurrence. The aim of this paper fits into the previous strategy: it proposes as a first part, a security mechanism preventing energy depletion attack which ties up the residual energy of a victim MANET node making it unable to process legitimate requests and consequently the needed service. The environment on which the proposition is made uses the delegation concept and extends a recently proposed reputation based clustering MANET environment organizing the network into clusters with elected cluster heads (CHs) and detecting and isolating malicious nodes.The second part of this paper concerns the formal specification of the proposed mechanism based on a certain number of constraints and its verification using adequate algorithms.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaushik, S., Kaushik, M.: Analysis of MANET security, architecture and assessment. Int. J. Electron. Comput. Sci. Eng. (IJECSE) 1(2), 787–793 (2012). ISSN 2277–1956

    Google Scholar 

  2. Geetika, N.K.: Detection and prevention algorithms of DDOS attack in MANETs. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(8), 61–65 (2013)

    Google Scholar 

  3. Chhabra, M., Gupta, B., Almomani, A.: A novel solution to handle DDOS attack in MANET. J. Inf. Secur. 4(3), 165–179 (2013)

    Article  Google Scholar 

  4. Sinha, S.K., Singh, R.K., Pandey, K.K., Sahu, M.K.: Distributed denial of service attack prevention using critical link method in MANET. Int. J. Adv. Res. Comput. Sci. Electron. Eng. (IJARCSEE) 2(3), 325 (2013)

    Google Scholar 

  5. Ahirwal, R., Mahour, L.: Analysis of DDoS attack effect and protection scheme in wireless mobile ad-hoc networks. Int. J. Comput. Sci. Eng. (IJCSE) 4(6), 1164 (2012)

    Google Scholar 

  6. Arunmozhi, S.A., Venkataramani, Y.: A flow monitoring scheme to defend reduction-of-quality (RoQ) attacks in mobile ad-hoc networks. Inf. Secur. J. Global Perspect. 19(5), 263–272 (2010)

    Article  Google Scholar 

  7. Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S.: A reputation-based clustering mechanism for MANET routing security. In: Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, September 2013

    Google Scholar 

  8. Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S.: Towards the definition of a mobility-based clustering environment for MANET. In: Proceedings of the Ninth International Conference on Wireless and Mobile Communications (ICWMC), Nice, France, August 2013

    Google Scholar 

  9. Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S.: A model for specification and validation of a trust management based security scheme in a MANET environment. In: Proceedings of the 4th International Workshop on Security of Mobile Applications (IWSMA), ARES, Toulouse, France, August 2015

    Google Scholar 

  10. Abassi, R., Guemara El Fatmi, S.: Dealing with delegation in a trust-based MANET. In: Proceedings of the IEEE 20th International Conference on Telecommunications (ICT) (2013)

    Google Scholar 

  11. Abassi, R., Guemara El Fatmi, S.: Delegation management modeling in a security policy based environment. In: Symbolic Computation in Software Science (SCSS) (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aida Ben Chehida Douss .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Ben Chehida Douss, A., Abassi, R., Guemara El Fatmi, S. (2016). Toward Securing MANET Against the Energy Depletion Attack. In: Lambrinoudakis, C., Gabillon, A. (eds) Risks and Security of Internet and Systems. CRiSIS 2015. Lecture Notes in Computer Science(), vol 9572. Springer, Cham. https://doi.org/10.1007/978-3-319-31811-0_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-31811-0_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-31810-3

  • Online ISBN: 978-3-319-31811-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics