Share Email Print

Proceedings Paper

IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

Paper Details

Date Published: 2 May 2008
PDF: 12 pages
Proc. SPIE 6982, Mobile Multimedia/Image Processing, Security, and Applications 2008, 698208 (2 May 2008); doi: 10.1117/12.783063
Show Author Affiliations
Chaorong Peng, Florida Institute of Technology (United States)
Chang Wen Chen, State Univ. of New York at Buffalo (United States)

Published in SPIE Proceedings Vol. 6982:
Mobile Multimedia/Image Processing, Security, and Applications 2008
Sos S. Agaian; Sabah A. Jassim, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?