A hotspot-based protocol for attack traceback in mobile ad hoc networks

Hungyuan Hsu, Sencun Zhu, Ali Hurson

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Based on the principle of divide and conquer, in this paper we propose an efficient traceback protocol for mobile ad hoc networks, The protocol is capable of detecting a hotspot where the attacker resides. It works by dividing the forwarding path of every packet into multiple interweaving fragments and each reachable fragment is individually reconstructed during a traceback process. Through simulations in theoretical mobility models as well as real mobility traces, we show that each traceback of our scheme can attribute to a very small hotspot and the attacker can be accurately identified after a number of traceback operations.

Original languageEnglish (US)
Title of host publicationProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
Pages333-336
Number of pages4
DOIs
Publication statusPublished - Jul 16 2010
Event5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010 - Beijing, China
Duration: Apr 13 2010Apr 16 2010

Publication series

NameProceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010

Other

Other5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
CountryChina
CityBeijing
Period4/13/104/16/10

    Fingerprint

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Software

Cite this

Hsu, H., Zhu, S., & Hurson, A. (2010). A hotspot-based protocol for attack traceback in mobile ad hoc networks. In Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 (pp. 333-336). (Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010). https://doi.org/10.1145/1755688.1755733