CBUPRE to Secure MANETs from DoS Attacks

  • Radha Krishna Reddy Pallavali
  • Samia BouzefraneEmail author
  • Selma Boumerdassi
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9395)


Nowadays, mobile devices are an increasingly useful part of our daily life. Networks through which mobile devices communicate are named Mobile Ad-hoc Networks (MANETs). Without using a fixed infrastructure, mobile nodes dynamically build a wireless network for communication. In order to ensure reliable communications, a main security issue in MANETs is protection from Denial of Service (DoS) Attacks. From past decade, only a few proposals have been made to secure MANETs from DoS Attacks. Generally, the normal encryption schemes protect data confidentiality from unauthorized users, but these techniques are limited to encrypted data sharing between mobile nodes. To overcome this issue, in this paper we propose to use a new proxy re-encryption technique called Compression-Based Unidirectional Proxy Re-Encryption (CBUPRE) for secure data exchange and efficient bandwidth use even during DoS attacks. This technique uses a new node called Dynamic TCP Proxy Node to check the authorization of nodes, to encrypt at a proxy level, and to secure the network against unintended nodes. Based on this, secure data exchange can be achieved with encrypted data. We present a correctness proof of how, through the CUPRE technique, the data can be transferred to the destination node in the group within the low bandwidth network securely even during DoS attacks.


Mobile Node Destination Node Malicious Node Distribute Coordination Function Digital Right Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Kaur, T., Toor, A., Saluja, K.: Defending manets against flooding attacks for military applications under group mobility. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1–6 (2014)Google Scholar
  2. 2.
    Konate, K., Abdourahime, G.: Attacks analysis in mobile ad hoc networks: modeling and simulation. In: 2011 Second International Conference on Intelligent Systems, Modeling and Simulation (ISMS), pp. 367–372 (2011)Google Scholar
  3. 3.
    Soryal, J., Saadawi, T.: IEEE 802.11 denial of service attack detection in manet. In: Wireless Telecommunications Symposium (WTS), pp. 1–8 (2012)Google Scholar
  4. 4.
    Pushpalatha, K., Chitra, M.: Gamanet: A ganatic algorithm approach for hierarchical group key management in mobile adhoc network. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 368–373 (2013)Google Scholar
  5. 5.
    Reddy, P.R.K., Bouzefrane, S.: Analysis and detection of dos attacks in cloud computing by using qse algorithm. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th International Conference on Embedded Software and Systems (HPCC,CSS,ICESS), pp. 1089–1096 (2014)Google Scholar
  6. 6.
    Lolla, V., Law, L., Krishnamurthy, S., Ravishankar, C., Manjunath, D.: Detecting mac layer back-o timer violations in mobile ad hoc networks. In: 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006, p. 63 (2006)Google Scholar
  7. 7.
    Jia, Q., Sun, K., Stavrou, A.: Capman: capability-based defense against multi-path denial of service (dos) attacks in manet. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (2011)Google Scholar
  8. 8.
    MacVittie, L.: Understanding advanced data compression (2013)Google Scholar
  9. 9.
    Base, O.D.: Oracle advanced compression with oracle database 12c (2015)Google Scholar
  10. 10.
    Oberhumer, M.F.: lzop (2010)Google Scholar
  11. 11.
    Seward, J.: bzip2 and libbzip2, version 1.0.5, a program and library for data compression (2007)Google Scholar
  12. 12.
    loup Gailly, J., Adler, M.: A massively spiffy yet delicately unobtrusive compression library (2013)Google Scholar
  13. 13.
    Wang, H., Cao, Z., Wang, L.: Multi-use and unidirectional identity-based proxy re- encryption schemes. Inf. Sci. 180, 4042–4059 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  14. 14.
    Smith, T.: Dvd jon: buy drm-less tracks from apple itunes, 18 March 2005Google Scholar
  15. 15.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9, 1–30 (2006)CrossRefzbMATHGoogle Scholar
  16. 16.
    Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS (2003)Google Scholar
  17. 17.
    Reddy, P.R.K., Sivaramaiah, S., Sesadri, U.: Secure data forwarding in cloud storage system by using umib proxy. Int. J. Comput. Technol. 10, 1905–1912 (2013)Google Scholar
  18. 18.
    Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 103–135. Springer, USA (2007)CrossRefGoogle Scholar
  19. 19.
    Gupta, H., Shrivastav, S., Sharma, S.: Detecting the dos attacks in aomdv using aomdv- ids routing. In: 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 380–384 (2013)Google Scholar
  20. 20.
    Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Gaiti, D.: Denial of service (dos) attacks detection in manets through statistical models. In: Global Information Infrastructure and Networking Symposium (GIIS), pp. 1–3 (2014)Google Scholar
  21. 21.
    Ahir, S., Marathe, N., Padiya, P.: Iamtt - new method for resisting network layer denial of service attack on manet. In: 2014 Fourth International Conference on Communication Systems and Network Technologies (CSNT), pp. 762–766 (2014)Google Scholar
  22. 22.
    Allen Kent, J.G.W.: Artificial Intelligence and ADA to Systems Integration: Concepts: Methods, and Tools (1992)Google Scholar
  23. 23.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9, 1–30 (2006)CrossRefzbMATHGoogle Scholar
  24. 24.
    Ouyang, T., Jin, S., Rabinovich, M.: Dynamic tcp proxies: coping with disadvantaged hosts in manets. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2009, pp. 530–536 (2009)Google Scholar
  25. 25.
    El-Sayed, A.: Clustering Based Group Key Management for MANET. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds.) SecNet 2013. CCIS, vol. 381, pp. 11–26. Springer, Heidelberg (2013)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Radha Krishna Reddy Pallavali
    • 1
  • Samia Bouzefrane
    • 2
    Email author
  • Selma Boumerdassi
    • 3
  1. 1.Computer Science and EngineeringLisbonPortugal
  2. 2.CEDRIC LabsCNAMParisFrance
  3. 3.INRIAParisFrance

Personalised recommendations