Abstract
In environments like virtual classrooms and defence areas, an ad-hoc cloud is increasingly being deployed. Ad-hoc cloud is prone to Denial of Service (DoS) attacks caused by addition of illegitimate clients to the cloud and busty requests from a single or multi-client. In this paper a client transparent approach is proposed using enhanced port hiding technique to mitigate these attacks and attain high performance in the ad-hoc cloud. Admission control is performed to bring control on the number of clients joining the ad-hoc cloud. A fair service to all requests of clients is achieved by a combined scheduling and congestion control mechanism for which wireless Greedy Primal Dual Algorithm (wGPD) is deployed and the algorithm achieves a greater hit ratio of 85 percent. A modified RTS/CTS technique suiting ad-hoc environment is also discussed to handle the hidden and exposed terminal problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Srivatsa, M., Iyengar, A., Yin, J.: Mtigating Appilcation-Level Denial of Service Attacks on Web Servers: A Client-Transparent Approach. ACM Transaction on the Web 2(3), Article 15 (2008)
Adabi, S., Jabbehdari, S., Rahmani, A., Adabi, S.: A Novel Distributed Clustering Algorithm for Mobile Ad-hoc Networks. Journal of Computer Science 4(2), 161–166 (2008)
Yin, J., Zeng, Q.-A., Agrawal, D.P.: A Novel Priority based Scheduling Scheme for Ad Hoc Networks. In: Cincinnati, OBR Center for Distributed and Mobile Computing. IEEE, Los Alamitos (2003)
Akyol, U., Andrews, M., Gupta, P., Hobby, J., Saniee, I., Stolyar, A.: Joint Scheduling and Congestion Control in Mobile Ad-Hoc Networks. In: 27th Conference on Computer Communications, IEEE, INFOCOM (2008)
Elizabeth, Y.S., Belding-Royer, M., Perkins, C.E.: Internet Connectivity for Ad hoc Mobile Networks. International Journal of Wireless Information Networks 9(2) (2002)
Stolyar, A.L.: Maximizing Queueing Network Utility Subject to Stabality: Greedy Primal-Dual Algorithm. Queueing Systems 50, 401–457 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Padmanabhan, J., Sukumar, A., Elumalai, E., Ramesh, S. (2011). An Enhanced Port Hiding Design to Handle DoS Attacks in an Ad-Hoc Environment. In: Abraham, A., Lloret Mauri, J., Buford, J.F., Suzuki, J., Thampi, S.M. (eds) Advances in Computing and Communications. ACC 2011. Communications in Computer and Information Science, vol 190. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22709-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-642-22709-7_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22708-0
Online ISBN: 978-3-642-22709-7
eBook Packages: Computer ScienceComputer Science (R0)