Mitigating Flooding Attacks in Mobile Ad-Hoc Networks Supporting Anonymous Communications
Source: Macquarie University
Recently several techniques that provide different degree of anonymity have been proposed for wired and wireless communication. Although, the recently proposed techniques are successful in achieving high degree of anonymity, there are some disadvantages associated with the proposed techniques. In this paper, the authors analyze the flooding and packet drop attacks in mobile ad hoc networks that support anonymous communication. Then, they propose a novel technique to deal with the flooding attacks. The approach can efficiently identify and isolate the malicious node that floods the network. In addition, the technique provides a mechanism to identify the benign behavior of an expelled node and rejoins the expelled node back into the network.