Multiplayer game for DDoS attacks resilience in ad hoc networks

Article English OPEN
Michalas, A.; Komninos, N.; Prasad, N. R.;
(2011)

This paper proposes a multiplayer game to prevent Distributed Denial of Service attack (DDoS) in ad hoc networks. The multiplayer game is based on game theory and cryptographic puzzles. We divide requests from nodes into separate groups which decreases the ability of ma... View more
  • References (14)
    14 references, page 1 of 2

    [1] H. Narasimhan, and V. Varadarajan, and C. P. Rangan, Game Theoretic Resistance to Denial of Service Attacks Using Hidden Difficulty Puzzles. In IPSEC, pages 359-376, 2010.

    [2] A. Agah and S. K. Das, Preventing DoS Attacks in Wireless Sensor Networks: A Repeated Game Theory Approach. In I. J. Network Security, pages 145-153, 2007.

    [3] Wu, Xiaoxin, and Yau, and David K. Y., Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. In ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 365-367, New York, USA, 2007. ACM.

    [4] N. Komninos, A Transport Layer Security Protocol for Hybrid Networks. Book Chapter in Wireless Communications Research Trends, pages 267- 285, January 2007, Nova Science Publishers Inc.

    [5] N. Komninos, and D. Vergados, and C. Douligeris, Layered Security Design for Mobile Ad-Hoc Networks. In Journal in Computers & Security, Elsevier, Volume 25, Issue 2, pages 121-130, Elsevier.

    [6] J. H. Cheon, and N. Hopper, and Y. Kim, and I. Osipkov, Timed-Release and Key-Insulated Public Key Encryption. In Financial Cryptography and Data Security, FC 2006, volume 4107 of LNCS, pages 191-205, 2006, Springer.

    [7] J. Cathalo, B. Libert and J.-J. Quisquater, Efficient and Non-interactive Timed-Release Encryption. In ICICS 2005, LNCS 3783, pages 291-303, Springer-Verlag, 2005.

    [8] C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art. In Computer Networks 44(5), pages 643-666, Texas, USA, 2004.

    [9] B. R. Waters, A. Juels and E. W. Felten, New client puzzle outsourcing techniques for dos resistance. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 246256, New York, NY, USA, ACM, May 2004.

    [10] B. Bencsath, I. Vajda and L. Buttyan, A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks. In Proceedings of the 2003 International Conference on Software, Telecommunications and Computer Networks, pages 763-767, 2003.

  • Metrics
Share - Bookmark