A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission

All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind of Datagram Chunk Dropping Attack occurring in the MANET multimedia transmission. If multimedia transmission is datagram oriented, the datagram are transferred in the form of certain data streams called Chunks. In this attack an intermediate intruder node drops some data streams decreasing the throughput of the network in turn affecting the Quality of Service (QoS). Thus the detection and prevention of this attack becomes very crucial. The Datagram Chunk Dropping Attack detection and prevention technique i.e. Cluster Based Datagram Chunk Dropping Detection and Prevention Technique (CBDCDDPT) is proposed. The network performance parameter i.e. throughput shows considerable amount of improvement by the use of proposed technique.

[1]  Djamel Djenouri,et al.  On eliminating packet droppers in MANET: A modular solution , 2009, Ad Hoc Networks.

[2]  Surasee Prahmkaew Traffic Policing over Various Ad Hoc Networks and Inter-Vehicular Communications , 2010, 2010 5th International Conference on Embedded and Multimedia Computing.

[3]  Sencun Zhu,et al.  Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification , 2006, 2006 Securecomm and Workshops.

[4]  Syed Atiya Begum Techniques for resilience of Denial of service Attacks in Mobile Ad Hoc Networks , 2012 .

[5]  Bipin Bihari Jayasingh,et al.  A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network , 2010 .

[6]  Abderrahmane Baadache,et al.  Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..

[7]  Imran Raza,et al.  Persistent packet reordering attack in TCP based Ad hoc wireless networks , 2010, 2010 International Conference on Information and Emerging Technologies.

[8]  Christos Bouras,et al.  Performance evaluation of routing protocols for multimedia transmission over mobile ad hoc networks , 2011, 2011 4th Joint IFIP Wireless and Mobile Networking Conference (WMNC 2011).

[9]  A. Helweh-Hannan Avoiding Misbehaving Nodes in Mobile Ad-Hoc Environments: Towards Improved QoS Routing , 2006, The 2nd International Conference on Distributed Frameworks for Multimedia Applications.

[10]  I. Woungang,et al.  Detecting blackhole attacks on DSR-based mobile ad hoc networks , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).

[11]  J.-P. Hubaux,et al.  Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.