메뉴 건너뛰기




Volumn , Issue , 2016, Pages

Mitigating dynamic DoS attacks in mobile ad hoc network

Author keywords

ad hoc network; AODV; DDOS; DOS; Manet

Indexed keywords

AD HOC NETWORKS; COMPUTER CRIME; DATA HANDLING; DENIAL-OF-SERVICE ATTACK; DOS; INFORMATION ANALYSIS; MOBILE SECURITY; NETWORK SECURITY; TOPOLOGY;

EID: 84992202684     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CDAN.2016.7570941     Document Type: Conference Paper
Times cited : (7)

References (23)
  • 2
    • 51149099465 scopus 로고    scopus 로고
    • Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network
    • IEEE
    • Lu Jin Zhongwei Zhang David Lai and Hong Zhou. "Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network." In Wireless Telecommunications Symposium, pp. 1-10, IEEE, 2006.
    • (2006) Wireless Telecommunications Symposium , pp. 1-10
    • Jin, L.1    Zhang, Z.2    Lai, D.3    Zhou, H.4
  • 4
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) routing
    • July Feb
    • Perkins C, Belding E. Royer, and Samir Das, "Ad hoc on-demand distance vector (AODV) routing,". IETF, RFC 3561, July 2003. http://www. 1eft. o. 2003 Feb.
    • (2003) IETF, RFC , vol.3561
    • Perkins, C.1    Royer, B.E.2    Das, S.3
  • 5
    • 84863131448 scopus 로고    scopus 로고
    • Defense of dos attack focusing on protecting resource in mobile ad hoc networks
    • Y. Liu and L. Shen, "Defense of DoS Attack Focusing on Protecting Resource in Mobile Ad Hoc Networks," In proceeding of Computer Knowledge and Technology 2007 Vol. 3 No. 16, 2007.
    • (2007) Proceeding of Computer Knowledge and Technology , vol.3 , Issue.16 , pp. 2007
    • Liu, Y.1    Shen, L.2
  • 8
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues for ad hoc wireless networks
    • LNCS, Springer-Verlag
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad Hoc Wireless Networks," Security Protocols, 7th International Workshop, LNCS, Springer-Verlag, 2009.
    • (2009) Security Protocols, 7th International Workshop
    • Stajano, F.1    Anderson, R.2
  • 11
    • 67649088357 scopus 로고    scopus 로고
    • Performance Comparison of AODV,DSDV and I-DSDV routing protocols in mobile ad hoc networks
    • Abdul Hadi Abd Rahman and Zuriati Ahmad Zukarnain, "Performance Comparison of AODV,DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks", European Journal of Scientific Research, pp.566-576, 2009
    • (2009) European Journal of Scientific Research , pp. 566-576
    • Abdul, H.1    Rahman, A.2    Zukarnain, Z.A.3
  • 12
    • 0742292815 scopus 로고    scopus 로고
    • Ad hoc on-demand distance vector (AODV) Routing
    • July
    • C. Perkins, E. Belding-Royer, and S. Das,"Ad Hoc On-Demand Distance Vector (AODV) Routing," RFC 3561, July 2003.
    • (2003) RFC , vol.3561
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 14
    • 24144437206 scopus 로고    scopus 로고
    • How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
    • Peng Ning, Kun Sun, "How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols", Ad Hoc Networks, Vol. 3, No. 6, pp. 795-819, 2006
    • (2006) Ad Hoc Networks , vol.3 , Issue.6 , pp. 795-819
    • Peng, N.1    Sun, K.2
  • 22
    • 84909615829 scopus 로고    scopus 로고
    • Methodology for detecting and thwarting DoS in MANET
    • Kanchan, Sanjeev Rana, "Methodology for Detecting and Thwarting DoS in MANET", IJCA,2011.
    • (2011) IJCA
    • Kanchan, S.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.