TY - JOUR
T1 - Novel defense mechanism against data flooding attacks in wireless ad hoc networks
AU - Kim, Hyojin
AU - Chitti, Ramachandra Bhargav
AU - Song, Jooseok
N1 - Copyright:
Copyright 2010 Elsevier B.V., All rights reserved.
PY - 2010/5
Y1 - 2010/5
N2 - Mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. The data flooding attack causes Denial of Service (DoS) attacks by flooding many data packets. However, there are a few existing defense systems against data flooding attacks. Moreover, the existing schemes may not guarantee the Quality of Service (QoS) of burst traffic since multimedia data are usually burst. Therefore, we propose a novel defense mechanism against data flooding attacks with the aim of enhancing the throughput. The simulation results show that the proposed scheme enhances the throughput of burst traffic.
AB - Mobile users like to use their own consumer electronic devices anywhere and at anytime to access multimedia data. Hence, we expect that wireless ad hoc networks will be widely used in the near future since these networks form the topology with low cost on the fly. However, consumer electronic devices generally operate on limited battery power and therefore are vulnerable to security threats like data flooding attacks. The data flooding attack causes Denial of Service (DoS) attacks by flooding many data packets. However, there are a few existing defense systems against data flooding attacks. Moreover, the existing schemes may not guarantee the Quality of Service (QoS) of burst traffic since multimedia data are usually burst. Therefore, we propose a novel defense mechanism against data flooding attacks with the aim of enhancing the throughput. The simulation results show that the proposed scheme enhances the throughput of burst traffic.
UR - http://www.scopus.com/inward/record.url?scp=77954712914&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954712914&partnerID=8YFLogxK
U2 - 10.1109/TCE.2010.5505973
DO - 10.1109/TCE.2010.5505973
M3 - Article
AN - SCOPUS:77954712914
VL - 56
SP - 579
EP - 582
JO - IEEE Transactions on Consumer Electronics
JF - IEEE Transactions on Consumer Electronics
SN - 0098-3063
IS - 2
M1 - 5505973
ER -