Open Access Open Access  Restricted Access Subscription Access

Clustering based Model to Provide Defense against DDoS attacks in MANETs

Deepa Nehra, Kanwalvir Singh Dhindsa, Bharat Bhushan



Security of MANETs is the part of extensive issue of research in past years. MANET is liable to DDoS attacks because of its no fixed infrastructure, changing topology, open medium, cooperative and trust-based algorithms and absence of a well-defined line of defense. DDoS attack is a synchronized attack created by attackers to overflow the target network with big quantity of information in the form of packets such that the resources of the target network are exhausted leading to the deterioration of the network performance. Most of the solutions to defend these attacks are meant for the wired network and not applicable to MANETs. In this proposal, we are going to discuss the resulting effects of these attacks on MANETs and try to defend them at the early stages. For this global defense scheme, we are using the concept of clustering in MANETs. The defense components are deployed on mobile nodes of clusters, which cooperate with each other and protect MANETs from DDoS attacks.

Keywords: MANETs, DDoS attacks, security, clustering

Cite this Article

Deepa, Kanwalvir Singh Dhindsa, Bharat Bhushan. Clustering based Model to Provide Defense against DDoS attacks in MANETs. Journal of Communication Engineering & Systems. 2019; 9(1): 7–13p.


Full Text:



Piskozub A. Denial of service and distributed denial of service attacks. TCSET-02, Lviv – Shavsko, Ukraine, February 18-23, 2002. (Conference Proceedings)

Tan H., Seah W. Framework for Statistical Filtering Against DDoS Attacks in MANETs. Proceedings of the 2nd International Conference on Embedded Software and Systems, IEEE Computer Society, Washington DC, USA, 2005; 456-65p. (Conference Proceedings)

Ahirwal R., Mahour L. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network International Journal on Computer Science and Engineering. June 2012.

Jin X., Zhang Y., Pan Y. at el. ZSBT: A Novel Algorithm for Tracing DoS Attackers in MANETs. EURASIP Journal on Wireless Communications and Networking. April 2006; 1-9p.

Kachirski O., Guha R. Effective Intrusion Detection Using Multiple Sensors in Wireless Ad Hoc Networks. Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS’03), January 2003; 57.1p. (Conference Proceedings)

Buchegger S., Boudec J. Performance analysis of the CONFIDANT protocol Cooperation of nodes – fairness in dynamic ad-hoc networks. Proceedings of 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc’02). June 2002; 226–336p. (Conference Proceedings)

Wu B., Chen J., Wu J. et al. A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. Wireless Network Security. 2007; 103-135p.

Şen S, Clark J., Tapiador J. Security Threats in Mobile Ad Hoc Networks. In: Security of Self Organizing Networks: MANET, WSN, WMN, VANET, CRC Press, 2016.

Singh R.K., Joshi R., Singhal M. Analysis of Security Threats and Vulnerabilities in Mobile Ad Hoc Network (MANET). International Journal of Computer Applications. April 2013; 68(4): 25-29p.

Kaur A., Singh H. A Study of Secure Routing protocols. International Journal of Application or Innovation in Engineering & Management (IJAIEM). February 2013; 2(2): 176-179p.

Tamilselvan L., Sankaranarayanan V. Prevention of Co-operative Blackhole Attack in MANET. Journal of Networks. 2008; 3(5): 13-20p.

Hu Y-C., Perrig A., Johnson D. Wormhole Attacks in Wireless Networks. IEEE JSAC, February 2006; 24(2).

Singh K., Dhindsa K., Bhushan B. Distributed Defense: An Edge over Centralized Defense against DDoS Attacks. International Journal of Computer Network and Information Security. March 2017; 9(3): 36-44p.


  • There are currently no refbacks.

Copyright (c) 2019 Journal of Communication Engineering & Systems