TY - GEN
T1 - A hotspot-based protocol for attack traceback in mobile ad hoc networks
AU - Hsu, Hungyuan
AU - Zhu, Sencun
AU - Hurson, Ali
PY - 2010
Y1 - 2010
N2 - Based on the principle of divide and conquer, in this paper we propose an efficient traceback protocol for mobile ad hoc networks, The protocol is capable of detecting a hotspot where the attacker resides. It works by dividing the forwarding path of every packet into multiple interweaving fragments and each reachable fragment is individually reconstructed during a traceback process. Through simulations in theoretical mobility models as well as real mobility traces, we show that each traceback of our scheme can attribute to a very small hotspot and the attacker can be accurately identified after a number of traceback operations.
AB - Based on the principle of divide and conquer, in this paper we propose an efficient traceback protocol for mobile ad hoc networks, The protocol is capable of detecting a hotspot where the attacker resides. It works by dividing the forwarding path of every packet into multiple interweaving fragments and each reachable fragment is individually reconstructed during a traceback process. Through simulations in theoretical mobility models as well as real mobility traces, we show that each traceback of our scheme can attribute to a very small hotspot and the attacker can be accurately identified after a number of traceback operations.
UR - http://www.scopus.com/inward/record.url?scp=77954467632&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77954467632&partnerID=8YFLogxK
U2 - 10.1145/1755688.1755733
DO - 10.1145/1755688.1755733
M3 - Conference contribution
AN - SCOPUS:77954467632
SN - 9781605589367
T3 - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
SP - 333
EP - 336
BT - Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010
T2 - 5th ACM Symposium on Information, Computer and Communication Security, ASIACCS 2010
Y2 - 13 April 2010 through 16 April 2010
ER -