Paper Title:
Research of Secure Scheme against Data Flooding Attack in Ad Hoc Networks
  Abstract

DATA flooding attack is a serious menace for the security of on-demand routing protocol in Ad Hoc networks. In the paper, on the basis of three typical on-demand routing protocols AODV, DSR and TORA, we present a special security scheme against data flooding attack. Then we simulate the scheme on NS2 platform and compare two performance parameters before and after using the scheme: average delay and packet delivery rate. The results indicate that this project is comparatively effective to resist the DATA flooding attack.

  Info
Periodical
Advanced Materials Research (Volumes 204-210)
Edited by
Helen Zhang, Gang Shen and David Jin
Pages
395-399
DOI
10.4028/www.scientific.net/AMR.204-210.395
Citation
L. C. Zhang, Z. G. Wang, T. Wang, Y. S. Sun, X. F. Xu, "Research of Secure Scheme against Data Flooding Attack in Ad Hoc Networks", Advanced Materials Research, Vols. 204-210, pp. 395-399, 2011
Online since
February 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Juan Chen, Hong Shan, Tao Ma
Chapter 6: Communication and Network
Abstract:Mobile ad-hoc networks (MANETs) are especially vulnerable to attacks because of lacking infrastructure and data transfer using radio...
1217
Authors: Yao Yan, Rui Xu
Chapter 7: Information Engineering and Technology
Abstract:Show the definition of Ad Hoc network attack cluster, and propose a new method of DDoS attacks for Ad Hoc Networks, which can accurately...
1371
Authors: Chun Cheng Niu, Kuan Cheng Zou, Yuan Ling Ou Yang, Guan Jie Tang, Yi Zou
Chapter 6: Information Technologies and Information Security
Abstract:nternet of Things is known to be the third wave of the world information industry following the computers and the Internet. In China, The...
1429
Authors: Yuan Ming Ding, Hao Qu, Xue Wang
Chapter 4: Information Technology Applications in Industry and Engineering
Abstract:Taking the AODV protocol as an example, the attack characteristics of different types of black holes are analyzed. Then, an attack model of...
1697
Authors: Kui Liang Xia
Chapter 8: Simulation and Model
Abstract:The low-rate denial of service attack is more applicable to the network in recent years as a means of attack, which is different from the...
1063