Due to constrained resources, DDoS attack is one of the biggest threats to MANET. IP traceback technique is useful to defend against such type of attacks, since it can identify the attack sources. Several types of traceback schemes have been proposed for wired networks. Among all the existing schemes, probabilistic packet marking (PPM) scheme might be the most promising scheme for MANET. However its performance in MANET is not as good as that in Internet. In this paper, a new scheme based on the codingtechnique (CT) is proposed for traceback in MANET. Furthermore, a new idea of Incremental traceback is raised to cope with the situation of incremental attack (ICT). We present the protocol design and conduct theoretical analysis of this scheme. Additionally, we conduct experiments to compare it with the traditional PPM scheme. The experimental results show that the new coding-based traceback scheme outperforms the PPM scheme in MANET.
 H. Yang, H. Y. Luo, F. Ye, S. W. Lu and L. X. Zhang, “Security in Mobile Ad Hoc Networks,” IEEE Wireless Communications Challenges and Solutions, Vol. 11, No. 1, 2004, pp. 38-47. http://dx.doi.org/10.1109/MWC.2004.1269716
 I. Aad, J. P. Hubaux and E. Knightly, “Impact of Denial of Service Attacks on Ad Hoc Networks,” IEEE/ACM Transactions on Net-working, Vol. 16, No. 4, 2008, pp. 791-802. http://dx.doi.org/10.1109/TNET.2007.904002
 A. Belenky and N. Ansari, “On IP Traceback,” IEEE Communications Magazine, Vol. 41, No. 7, 2003, pp. 142-153. http://dx.doi.org/10.1109/MCOM.2003.1215651
 Wikipedia. Gaussian Elimination. http://en.wikipedia.org/wiki/Gaussian_elimination
 S. Savage, D. Wetherall, A. Karlin and T. Anderson, “Practical Network Support for IP Traceback,” ACM SIGCOMM Computer Communication Review, Vol. 30, No. 4, 2000, pp. 295-306. http://dx.doi.org/10.1145/347057.347560
 GloMoSim Simulator. http://pcl.cs.ucla.edu/projects/glomosim/ography
 S. Bellovin, M. Leech and T. Taylor, “ICMP Traceback Messages,” 2001. http://www3.ietf.org/proceedings/01dec/I-D/draft-ietf-itrace-01.txt
 A. C.Snoeren, C. Partridge, L. A. Sanchez and C. E. Jones, “Hash-Based IP Traceback,” Proceedings of the 2001 Conference of Applications, Technologies, Architectures, and Protocols for Computer Communications, August 2001, pp. 3-14.
 I.-Y. Kim and K.-C. Kim, “A Resource-Efficient IP Traceback Technique for Mobile Ad-hoc Networks Based on Time-tagged Bloom Filter,” International Conference on Convergence and Hybrid Information Technology, 2008, pp. 549-554.
 Y. Kim and A. Helmy, “SWAT: Small World-Based Attacker Traceback in Ad-hoc Networks,” Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous System: Networking and Services, San Diego, July 2005.
 B.-C. Cheng, H. Chen and R.-Y. Tseng, “A Packet Marking with Fair Probability Distribution Function for Minimizing the Convergence Time in Wireless Sensor Networks,” Computer Communications, Vol. 31, No. 18, 2008, pp. 4352-4359. http://dx.doi.org/10.1016/j.comcom.2008.03.024
 B.-C. Cheng, H. Chen and G.-T. Liao, “FBT: An Efficient Traceback Scheme in Hierarchical Wireless Sensor Network”, Security and Communication Networks, Vol. 2, No. 2, 2009, pp.133-144. http://dx.doi.org/10.1002/sec.88