{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:38:37Z","timestamp":1759091917317},"reference-count":17,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1,1]]},"abstract":"<p>This paper proposes a technique to defeat Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks in Ad Hoc Networks. The technique is divided into two main parts and with game theory and cryptographic puzzles. Introduced first is a new client puzzle to prevent DoS attacks in such networks. The second part presents a multiplayer game that takes place between the nodes of an ad hoc network and based on fundamental principles of game theory. By combining computational problems with puzzles, improvement occurs in the efficiency and latency of the communicating nodes and resistance in DoS and DDoS attacks. Experimental results show the effectiveness of the approach for devices with limited resources and for environments like ad hoc networks where nodes must exchange information quickly.<\/p>","DOI":"10.4018\/jdcf.2011010102","type":"journal-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T17:46:05Z","timestamp":1354643165000},"page":"14-36","source":"Crossref","is-referenced-by-count":8,"title":["Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks"],"prefix":"10.4018","volume":"3","author":[{"given":"Antonis","family":"Michalas","sequence":"first","affiliation":[{"name":"Athens Information Technology, Greece"}]},{"given":"Nikos","family":"Komninos","sequence":"additional","affiliation":[{"name":"Athens Information Technology, Greece"}]},{"given":"Neeli R.","family":"Prasad","sequence":"additional","affiliation":[{"name":"Aalborg University, Denmark"}]}],"member":"2432","reference":[{"issue":"2","key":"jdcf.2011010102-0","first-page":"145","article-title":"Preventing DoS attacks in wireless sensor networks: A repeated game theory approach.","volume":"5","author":"A.Agah","year":"2007","journal-title":"International Journal of Network Security"},{"key":"jdcf.2011010102-1","unstructured":"Bencsath, B., Vajda, I., & Buttyan, L. (2003). A game based analysis of the client puzzle approach to defend against DOS attacks. In Proceedings of the 2003 International Conference on Software, Telecommunications and Computer Networks (pp. 763-767)."},{"key":"jdcf.2011010102-2","unstructured":"Dean, D., & Stubblefield, A. (2001). Using client puzzles to protect TLS. Retrieved from http:\/\/www.csl.sri.com\/users\/ddean\/papers\/usenix01b.pdf"},{"key":"jdcf.2011010102-3","doi-asserted-by":"crossref","unstructured":"Douligeris, C., & Mitrokotsa, A. (2004). DDoS attacks and defense mechanisms: classification and state-of-the-art. Retrieved from http:\/\/portal.acm.org\/citation.cfm?id=987158","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"jdcf.2011010102-4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1593279"},{"key":"jdcf.2011010102-5","doi-asserted-by":"crossref","unstructured":"Gupta, V., Krishnamurthy, S., & Faloutsos, M. (2002). Denial of service attacks at the MAC layer in wireless ad hoc networks. Retrieved from http:\/\/citeseer.ist.psu.edu\/karpijoki01security.html","DOI":"10.1109\/MILCOM.2002.1179634"},{"key":"jdcf.2011010102-6","unstructured":"Juels, A., & Brainard, J. (1999). Client puzzles: A cryptographic countermeasure against connection depletion attacks. In S. Kent (Ed.), Proceedings of Networks and Distributed Security Systems (pp. 151-165)."},{"key":"jdcf.2011010102-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.09.005"},{"issue":"1-2","key":"jdcf.2011010102-8","doi-asserted-by":"crossref","first-page":"143","DOI":"10.3233\/JCS-2001-91-206","article-title":"A cost-based framework for analysis of denial of service in networks.","volume":"9","author":"C.Meadows","year":"2001","journal-title":"Journal of Computer Security"},{"key":"jdcf.2011010102-9","unstructured":"Morrissey, P., Smart, N., & Warinschi, B. (2009). Security notions and generic constructions for client puzzles. Retrieved from http:\/\/eprint.iacr.org\/2009\/331.pdf"},{"key":"jdcf.2011010102-10","doi-asserted-by":"crossref","unstructured":"Narasimhan, H., Varadarajan, V., & Rangan, C. P. (2010). Game theoretic resistance to denial of service attacks using hidden difficulty puzzles. Retrieved from http:\/\/eprint.iacr.org\/2009\/350.pdf","DOI":"10.1007\/978-3-642-12827-1_26"},{"key":"jdcf.2011010102-11","doi-asserted-by":"crossref","unstructured":"Schuba, C., Krsul, I., Kuhn, M., Spaffold, E., Sundaram, A., & Zamboni, D. (1997, May). Analysis of a denial of service attack on TCP. In Proceedings of the 1997 Symposium on Security and Privacy, Washington, DC.","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"jdcf.2011010102-12","doi-asserted-by":"crossref","unstructured":"Srivastava, V., Neel, J., Mackenzie, A. B., Menon, R., Dasilva, L. A., Hicks, J. E., & Reed, J. H. Gilles (2005). Using game theory to analyze wireless ad hoc networks. Communications Surveys & Tutorials, IEEE, 7(4):46{56}, 2005.","DOI":"10.1109\/COMST.2005.1593279"},{"key":"jdcf.2011010102-13","author":"W.Staling","year":"2006","journal-title":"Cryptography and network security: Principles and practice"},{"key":"jdcf.2011010102-14","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-01-01310-2"},{"key":"jdcf.2011010102-15","doi-asserted-by":"crossref","unstructured":"Waters, B., Juels, A., Halderman, A. J., & Felten, E. W. (2004). New client puzzle outsourcing techniques for DoS resistance. In Proceedings of the 11th ACM Conference on Computer and Communications Security (pp. 246-256).","DOI":"10.1145\/1030083.1030117"},{"key":"jdcf.2011010102-16","doi-asserted-by":"crossref","unstructured":"Wu, X., & Yau, D. (2007). Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (pp. 365-367).","DOI":"10.1145\/1229285.1229329"}],"container-title":["International Journal of Digital Crime and Forensics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=52776","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:02:17Z","timestamp":1654106537000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdcf.2011010102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2011,1,1]]},"references-count":17,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdcf.2011010102","relation":{},"ISSN":["1941-6210","1941-6229"],"issn-type":[{"value":"1941-6210","type":"print"},{"value":"1941-6229","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,1,1]]}}}