Skip to main content

CBUPRE to Secure MANETs from DoS Attacks

  • Conference paper
  • First Online:
Mobile, Secure, and Programmable Networking (MSPN 2015)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 9395))

  • 604 Accesses

Abstract

Nowadays, mobile devices are an increasingly useful part of our daily life. Networks through which mobile devices communicate are named Mobile Ad-hoc Networks (MANETs). Without using a fixed infrastructure, mobile nodes dynamically build a wireless network for communication. In order to ensure reliable communications, a main security issue in MANETs is protection from Denial of Service (DoS) Attacks. From past decade, only a few proposals have been made to secure MANETs from DoS Attacks. Generally, the normal encryption schemes protect data confidentiality from unauthorized users, but these techniques are limited to encrypted data sharing between mobile nodes. To overcome this issue, in this paper we propose to use a new proxy re-encryption technique called Compression-Based Unidirectional Proxy Re-Encryption (CBUPRE) for secure data exchange and efficient bandwidth use even during DoS attacks. This technique uses a new node called Dynamic TCP Proxy Node to check the authorization of nodes, to encrypt at a proxy level, and to secure the network against unintended nodes. Based on this, secure data exchange can be achieved with encrypted data. We present a correctness proof of how, through the CUPRE technique, the data can be transferred to the destination node in the group within the low bandwidth network securely even during DoS attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kaur, T., Toor, A., Saluja, K.: Defending manets against flooding attacks for military applications under group mobility. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1–6 (2014)

    Google Scholar 

  2. Konate, K., Abdourahime, G.: Attacks analysis in mobile ad hoc networks: modeling and simulation. In: 2011 Second International Conference on Intelligent Systems, Modeling and Simulation (ISMS), pp. 367–372 (2011)

    Google Scholar 

  3. Soryal, J., Saadawi, T.: IEEE 802.11 denial of service attack detection in manet. In: Wireless Telecommunications Symposium (WTS), pp. 1–8 (2012)

    Google Scholar 

  4. Pushpalatha, K., Chitra, M.: Gamanet: A ganatic algorithm approach for hierarchical group key management in mobile adhoc network. In: 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering (PRIME), pp. 368–373 (2013)

    Google Scholar 

  5. Reddy, P.R.K., Bouzefrane, S.: Analysis and detection of dos attacks in cloud computing by using qse algorithm. In: 2014 IEEE International Conference on High Performance Computing and Communications, 2014 IEEE 6th International Symposium on Cyberspace Safety and Security, 2014 IEEE 11th International Conference on Embedded Software and Systems (HPCC,CSS,ICESS), pp. 1089–1096 (2014)

    Google Scholar 

  6. Lolla, V., Law, L., Krishnamurthy, S., Ravishankar, C., Manjunath, D.: Detecting mac layer back-o timer violations in mobile ad hoc networks. In: 26th IEEE International Conference on Distributed Computing Systems, ICDCS 2006, p. 63 (2006)

    Google Scholar 

  7. Jia, Q., Sun, K., Stavrou, A.: Capman: capability-based defense against multi-path denial of service (dos) attacks in manet. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1–6 (2011)

    Google Scholar 

  8. MacVittie, L.: Understanding advanced data compression (2013)

    Google Scholar 

  9. Base, O.D.: Oracle advanced compression with oracle database 12c (2015)

    Google Scholar 

  10. Oberhumer, M.F.: lzop (2010)

    Google Scholar 

  11. Seward, J.: bzip2 and libbzip2, version 1.0.5, a program and library for data compression (2007)

    Google Scholar 

  12. loup Gailly, J., Adler, M.: A massively spiffy yet delicately unobtrusive compression library (2013)

    Google Scholar 

  13. Wang, H., Cao, Z., Wang, L.: Multi-use and unidirectional identity-based proxy re- encryption schemes. Inf. Sci. 180, 4042–4059 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  14. Smith, T.: Dvd jon: buy drm-less tracks from apple itunes, 18 March 2005

    Google Scholar 

  15. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9, 1–30 (2006)

    Article  MATH  Google Scholar 

  16. Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS (2003)

    Google Scholar 

  17. Reddy, P.R.K., Sivaramaiah, S., Sesadri, U.: Secure data forwarding in cloud storage system by using umib proxy. Int. J. Comput. Technol. 10, 1905–1912 (2013)

    Google Scholar 

  18. Wu, B., Chen, J., Wu, J., Cardei, M.: A survey of attacks and countermeasures in mobile ad hoc networks. In: Xiao, Y., Shen, X.S., Du, D.-Z. (eds.) Wireless Network Security, pp. 103–135. Springer, USA (2007)

    Chapter  Google Scholar 

  19. Gupta, H., Shrivastav, S., Sharma, S.: Detecting the dos attacks in aomdv using aomdv- ids routing. In: 2013 5th International Conference on Computational Intelligence and Communication Networks (CICN), pp. 380–384 (2013)

    Google Scholar 

  20. Rmayti, M., Begriche, Y., Khatoun, R., Khoukhi, L., Gaiti, D.: Denial of service (dos) attacks detection in manets through statistical models. In: Global Information Infrastructure and Networking Symposium (GIIS), pp. 1–3 (2014)

    Google Scholar 

  21. Ahir, S., Marathe, N., Padiya, P.: Iamtt - new method for resisting network layer denial of service attack on manet. In: 2014 Fourth International Conference on Communication Systems and Network Technologies (CSNT), pp. 762–766 (2014)

    Google Scholar 

  22. Allen Kent, J.G.W.: Artificial Intelligence and ADA to Systems Integration: Concepts: Methods, and Tools (1992)

    Google Scholar 

  23. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9, 1–30 (2006)

    Article  MATH  Google Scholar 

  24. Ouyang, T., Jin, S., Rabinovich, M.: Dynamic tcp proxies: coping with disadvantaged hosts in manets. In: 29th IEEE International Conference on Distributed Computing Systems Workshops, ICDCS Workshops 2009, pp. 530–536 (2009)

    Google Scholar 

  25. El-Sayed, A.: Clustering Based Group Key Management for MANET. In: Awad, A.I., Hassanien, A.E., Baba, K. (eds.) SecNet 2013. CCIS, vol. 381, pp. 11–26. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Samia Bouzefrane .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Reddy Pallavali, R.K., Bouzefrane, S., Boumerdassi, S. (2015). CBUPRE to Secure MANETs from DoS Attacks. In: Boumerdassi, S., Bouzefrane, S., Renault, É. (eds) Mobile, Secure, and Programmable Networking. MSPN 2015. Lecture Notes in Computer Science(), vol 9395. Springer, Cham. https://doi.org/10.1007/978-3-319-25744-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25744-0_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25743-3

  • Online ISBN: 978-3-319-25744-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics