Reference Hub8
Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks

Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks

Antonis Michalas, Nikos Komninos, Neeli R. Prasad
Copyright: © 2011 |Volume: 3 |Issue: 1 |Pages: 23
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781613506455|DOI: 10.4018/jdcf.2011010102
Cite Article Cite Article

MLA

Michalas, Antonis, et al. "Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks." IJDCF vol.3, no.1 2011: pp.14-36. http://doi.org/10.4018/jdcf.2011010102

APA

Michalas, A., Komninos, N., & Prasad, N. R. (2011). Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks. International Journal of Digital Crime and Forensics (IJDCF), 3(1), 14-36. http://doi.org/10.4018/jdcf.2011010102

Chicago

Michalas, Antonis, Nikos Komninos, and Neeli R. Prasad. "Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks," International Journal of Digital Crime and Forensics (IJDCF) 3, no.1: 14-36. http://doi.org/10.4018/jdcf.2011010102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.