Skip to main content

An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment

  • Conference paper
Advances in Computing and Communications (ACC 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 190))

Included in the following conference series:

  • 1739 Accesses

Abstract

In environments like virtual classrooms and defence areas, an ad-hoc cloud is increasingly being deployed. Ad-hoc cloud is prone to Denial of Service (DoS) attacks caused by addition of illegitimate clients to the cloud and busty requests from a single or multi-client. In this paper a client transparent approach is proposed using enhanced port hiding technique to mitigate these attacks and attain high performance in the ad-hoc cloud. Admission control is performed to bring control on the number of clients joining the ad-hoc cloud. A fair service to all requests of clients is achieved by a combined scheduling and congestion control mechanism for which wireless Greedy Primal Dual Algorithm (wGPD) is deployed and the algorithm achieves a greater hit ratio of 85 percent. A modified RTS/CTS technique suiting ad-hoc environment is also discussed to handle the hidden and exposed terminal problems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Srivatsa, M., Iyengar, A., Yin, J.: Mtigating Appilcation-Level Denial of Service Attacks on Web Servers: A Client-Transparent Approach. ACM Transaction on the Web 2(3), Article 15 (2008)

    Google Scholar 

  2. Adabi, S., Jabbehdari, S., Rahmani, A., Adabi, S.: A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks. Journal of Computer Science 4(2), 161–166 (2008)

    Article  Google Scholar 

  3. Yin, J., Zeng, Q.-A., Agrawal, D.P.: A Novel Priority based Scheduling Scheme for Ad Hoc Networks. In: Cincinnati, OBR Center for Distributed and Mobile Computing. IEEE, Los Alamitos (2003)

    Google Scholar 

  4. Akyol, U., Andrews, M., Gupta, P., Hobby, J., Saniee, I., Stolyar, A.: Joint Scheduling and Congestion Control in Mobile Ad-Hoc Networks. In: 27th Conference on Computer Communications, IEEE, INFOCOM (2008)

    Google Scholar 

  5. Elizabeth, Y.S., Belding-Royer, M., Perkins, C.E.: Internet Connectivity for Ad hoc Mobile Networks. International Journal of Wireless Information Networks 9(2) (2002)

    Google Scholar 

  6. Stolyar, A.L.: Maximizing Queueing Network Utility Subject to Stabality: Greedy Primal-Dual Algorithm. Queueing Systems 50, 401–457 (2005)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Padmanabhan, J., Sukumar, A., Elumalai, E., Ramesh, S. (2011). An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22709-7_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22708-0

  • Online ISBN: 978-3-642-22709-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics