Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Subathra, P.
- Mitigation of Flooding Attack Using Defense Mechanism in Mobile Adhoc Networks
Abstract Views :159 |
PDF Views:2
Authors
Affiliations
1 Thiagarajar College of Engineering, Madurai, IN
1 Thiagarajar College of Engineering, Madurai, IN
Source
Networking and Communication Engineering, Vol 5, No 3 (2013), Pagination: 97-101Abstract
A Mobile Adhoc Network (MANET) is a self configuring network of mobile routers connected by wireless links, which form the topology with low cost on the fly. Because of using some consumer electronic devices which are generally operate on limited battery power and therefore vulnerable to security threats like data flooding attacks. In the data flooding, malicious nodes flood the network by sending useless data packets. These useless data packet exhausts the network resources and hence legitimated user can not able to use the resources for valid communication because of energy drain, buffer drain and so. Hence the period based defense mechanism was proposed against data flooding attacks with the aim of enhancing the throughput in mobile Adhoc networks. Thus identification of the malicious as well as victim node with respect to buffer size is done, defense mechanism is applied against the flooding attack and analyze the performance with and without using defense mechanism in the mobile adhoc networks.Keywords
Data Flooding Attack, Mobile Adhoc Network, Throughput.- Detecting Digital Image forgeries Using Re-Sampling by Automatic Region of Interest (ROI)
Abstract Views :168 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Amrita School of Engineering, IN
2 Department of Computer Science and Engineering, Anna University of Technology, Tiruchirappalli, IN
1 Department of Computer Science and Engineering, Amrita School of Engineering, IN
2 Department of Computer Science and Engineering, Anna University of Technology, Tiruchirappalli, IN