A hotspot-based protocol for attack traceback in mobile ad hoc networks

Hungyuan Hsu, Sencun Zhu, Ali Hurson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Based on the principle of divide and conquer, in this paper we propose an efficient traceback protocol for mobile ad hoc networks, The protocol is capable of detecting a hotspot where the attacker resides. It works by dividing the forwarding path of every packet into multiple interweaving fragments and each reachable fragment is individually reconstructed during a traceback process. Through simulations in theoretical mobility models as well as real mobility traces, we show that each traceback of our scheme can attribute to a very small hotspot and the attacker can be accurately identified after a number of traceback operations.

Original languageEnglish (US)
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages333-336
Number of pages4
DOIs
StatePublished - Jul 16 2010
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: Apr 13 2010Apr 16 2010

Publication series

NameProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

Other

Other5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Country/TerritoryChina
CityBeijing
Period4/13/104/16/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Fingerprint

Dive into the research topics of 'A hotspot-based protocol for attack traceback in mobile ad hoc networks'. Together they form a unique fingerprint.

Cite this