Removal of Flooding Attacks in Ad Hoc Wireless Networks to Provide Security against Availability Security Service
Abstract
Keywords
Full Text:
PDFReferences
Imrich Chlamtac, Marco Conti, Conti, Jennifer J.-N. Liu, “Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks “I (2003) pp.13-64, Elseiver publications.
Jie Li and Jien Kato,” Future Trust man agent framework for Mobile Ad hoc Networks”.IEEE Communications Magazine, April 2008.)
Y.sun et al., “Defense of trust management vulnerabilities in distributed networks”, IEEE Communications Magazine, February 2008.
Y.Sun et al., “Information Theoretic Framework of Trust Modeling and Evaluation for ad hoc networks”IEEE JSAC, vol.24, no.2, Feb 2006.
Manel Guerrero Zapata, “Secure ad hoc on-demand distance vector routing,ACM SIGMOBILE Mobile Computing and Communications “Review,v.6 n3,July 2002 [doi>10,1145/581291.581312]
Panagiotis Papadiminitratos and Zygmunt J.Hass,”Secure data Communication in Mobile ad hoc Networks”IEEE JSAC, vol.24, No.2, February 2006.
P.Papadimitratos and Zygmunt J.Haas and Samar.”The Secure Routing Protocol (SRP) for ad hoc Networks.draft-papadimitratos-secure-routing-protocol”00.txt, Dec.2002.
Lidong Zhou and Zygmunt J.HaasHappy sankranti/pongalhttp://crackspider.net/ “ Securing Ad Hoc networks” In Proc IEEE,special issue on network security November/December,1999.
Marjan kuchaki Rafsanjani, Ali Movaghar, and faroukh Koroupi “Investigating Intrusion detection Systems in MANET and Comparing IDSs for detecting Misbehaving Nodes” World Academy of Science, Engineering and Technology 44 2008.
Elizabeth M.Royer, University of California, Santa Barbara Chai-Keong Toh, Georgia Institute of Technology “A review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks”IEEE personal communication, Apr1999.
Ping Yi,Zhoulin Dai,Yiping Zhong,Shiyong Zhang”aresisting Flooding Attacks in Ad Hoc Neyworks”Proceedings of the International Conference on Information Technology:Coding and Computing (ITCC’05) 0-7695-2315-3/05$20.00IEEE
Bo-Cang Peng and chiu-Kuo Liang “Prevention techniques for flooding attack in Ad Hoc Networks
Jian-hua Song1,2,Fan Hong1,Yu Zhang1 “effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks “Proceedings of the Seventh International conference on Parallel and Distributed Computing, Applications and Technologies(PDCAT’06)0-7695-2736-1/06$20.0@2006
Venkat Balakrishnan,Vijay Varadharajan and Uday Tupakulu”Mitigating Anonymous Communications” The 2nd International Conference on Wireless broadband and Ultra Wideband Communications(Answerless 2007)0-7695-2842-2/07$25.00@2007
Revathi Venkataraman, M.Pushpalatha, Rishav Khemka and T.Rama Rao “Prevention of flooding attack in mobile ad hoc network”. International Conference on Advances in Computing ,Communication and Control(ICAC3’09)
David B.Johnson David A.Maltz Josh Broch “DSR:The Dynamic Source Routing Protocol for Multi-HopWireles d Hoc Networks”http://www.monarch.cs.cmu.edu/
J.Al-Jaroodi,”Security Issues in Wireless Mobile Ad hoc Networks at the Network layer,” University of Nebraska-Lincoln, Dept.of Computer Science and Engineering, Technical Report TR02-10-07, November 2002.
A.Burg,”ad Hoc networks specific attacks, Seminar on Ad Hoc Networking: concept, applications, and security, Nov., 2003.
D.Sreenivasa Rao, A.Vani”Secure Routing Protocols for wireless ad hoc Networks”Gitam Journal of Information Communication Technology pp.143-148 Volume-1 July-december-2008.
Virendra Pal singh,sweta Jain ,Jyothi Singhar”Hello Flood Attacks and its Countermeasures in Wireless Sensors networksIJCSI International Journal of Computer science Issues,Vol.7 Issue 3,No.11,May 2010
Shishir K.Shandilya, Sunita Sahu”A Trust Based Security Scheme for RREQ Flooding Attack in MANET” International Journal of Computer Applications (0975-8887) volume 5-no.12, August 2010.
C.Perkins, E.Royer, and S.Das, “Ad hoc On-demand Distance Vector (AODV),”RFC 3561, 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.