Back
 JIS  Vol.9 No.1 , January 2018
The Study of Secure Congestion Control for TCP in Ad Hoc Networks
Abstract:
Ad hoc networks are vulnerable to various attacks. In addition, congestion caused by limited resources may occur at any time in the transmission of the packets at intermediate nodes. This paper proposes a dynamic congestion control method of the selection of a secure path. By estimating the average queue length at the nodes, the congestion level at present is detected. If the occurrence of the possible congestion is predicted, the network will select a new path where all nodes have been certified as trusted nodes, generating session keys in the TCP three-way handshake to prevent the denial of service attacks. Simulation results show that the new algorithm is superior to TCP Reno algorithm in terms of security, packets loss rate, throughput, and end-to-end delay.
Cite this paper: Zhang, W. , Lin, L. and Du, L. (2018) The Study of Secure Congestion Control for TCP in Ad Hoc Networks. Journal of Information Security, 9, 25-32. doi: 10.4236/jis.2018.91003.
References

[1]   Gutub, A.A. (2015) Exploratory Data Visualization for Smart Systems. Smart Cities 2015 - 3rd Annual Digital Grids and Smart Cities Workshop, Burj Rafal Hotel Kempinski, Riyadh, Saudi Arabia, May 2015, 1528-1537.

[2]   Alharthi, N. and Gutub, A. (2017) Data Visualization to Explore Improving Decision-Making within Hajj Services. Scientific Modelling and Research, 2, 9-18.
https://doi.org/10.20448/808.2.1.9.18

[3]   Al-Otaibi, N.A. and Gutub, A.A. (2014) 2-Leyer Security System for Hiding Sensitive Text Data on Personal Computers. Lecture Notes on Information Theory, 2, 151-157.
https://doi.org/10.12720/lnit.2.2.151-157

[4]   Aljuaid, N. and Gutub, A. (2014) Flexible Stego-System for Hiding Text in Images of Personal Computers Based on User Security Priority. Proceedings of 2014 International Conference on Advanced Engineering Technologies (AET-2014), Dubai UAE, 25-26 December 2014, 250-256.

[5]   Dife, W. and Hellman, M.E. (2006) New Directons in Cryptography. In IEEE Transacton on Informaton Theory, IT-22, Nov. 2006, 644-654.

[6]   Marti, S., Giuli, T.J. and Lai, K. (2000) Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In ACM Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, Massachusetts, USA, 06-11 August 2000, 255-265.
https://doi.org/10.1145/345910.345955

[7]   Sheltami, T., Al-Roubaiey, A., Shakshuki, E. and Mahmoud, A. (2009) Video Transmission Enhancement in Presence of Misbehaving Nodes in MANETs. Multimedia Systems, 15, 273-282.
https://doi.org/10.1007/s00530-009-0166-0

[8]   Shakshuki, E.M., Kang, N. and Sheltami, T.R. (2013) EAACK a Secure Intrusion-Detection System for MANETs. IEEE Transactions on Industrial Electronics, 60, 1089-1098.
https://doi.org/10.1109/TIE.2012.2196010

[9]   Soleimani, M.T. and Kahvand, M. (2014) Defending Packet Dropping Attacks Based on Dynamic Trust Model in Wireless Ad Hoc Networks. In IEEE 17th Mediterranean Electrotechnical Conference (MELECON), Beirut, Lebanon, 13-16 April 2014, 362-366.
https://doi.org/10.1109/MELCON.2014.6820561

[10]   Xu, W.Q., Wang, Y.M., Yu, C.H., et al. (2000) Cross-Layer Optimal Congestion Control Scheme in Mobile Ad Hoc Networks. Journal of Software, 21, 1667-1678.

[11]   Ghosh, U. and Data, R. (2012) A Novel Signature Scheme to Secure Distributed Dynamic Address Configuration Protocol in Mobile Ad Hoc Networks. In IEEE WCNC, 2700-5, Apr. 2012.

[12]   Ramakrishnan, K.K., Floyd, S., Black, D. and Ramakrishnan, G.K. (2001) The Addition of Explicit Congeston Notificaton (ECN) to ip. RFC Editor, USA, 3186. 2001.

[13]   DARPA (2014) The Network Simulator-NS2.
http://www.isi.edu/nsnam/ns/index.html

 
 
Top