Security Mechanism against Flood Attacks in Ad Hoc Networks

Article Preview

Abstract:

The most challenging work in ad hoc networks now is to prevent attacks. This paper labors a security machine against flood attacks in a typical protocol of AD HOC network AODV. In this mechanism, we include buffer management and credibility management.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 433-440)

Pages:

5902-5905

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Ping Yi, Yiping Zhong, Shiyong Zhang. Dos Attack and Defense in Mobile Ad Hoc Networks[J]. Journal of Computer Research and Development. 2005, 42(4): 697-704.

DOI: 10.1360/crad20050425

Google Scholar

[2] HUANG Yufei, WANG Peikang, HUANG Shaobin. Route discovery algorithms based on trust in mobile Ad hoc network[J]. Computer Aided Engineering. 2005, 14(2): 59-62.

Google Scholar

[3] Zhi Ang EU and Winston Khoon Guan SEAH. Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks. ICOIN-2006, Sendai, Japan, 2006. 327-336.

DOI: 10.1007/11919568_33

Google Scholar

[4] Song Jianhua. Research on Methods of Routing Intrusion Detection in Ad Hoc Networks[D]. Huazhong University of Science and Technology. 2007. 72-76.

Google Scholar

[5] Ping Yi, Zhoulin Dai, Yiping Zhong, Shiyong Zhang, Resisting Flooding Attacks in Ad Hoc Networks. In: Proceedings of the International Conference on Information Technology: Coding and Computing(ITCC2005), IEEE Press, Las Vegas, USA, April 4-6, 2005. 657-662.

DOI: 10.1109/itcc.2005.248

Google Scholar

[6] C. Perkins, Ad hoc On-Demand Distance Vector (AODV) Routing, RFC3561[S], 2003, 7.

DOI: 10.17487/rfc3561

Google Scholar