Learning automata: an introduction
Learning automata: an introduction
IEEE/ACM Transactions on Networking (TON)
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
International Journal of Communication Systems
An Efficient Dynamic Algorithm for Maintaining All-Pairs Shortest Paths in Stochastic Networks
IEEE Transactions on Computers
Analyzing large DDoS attacks using multiple data sources
Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense
Non-intrusive IP traceback for DDoS attacks
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
IEEE Transactions on Computers
Stochastic Security in Wireless Mesh Networks via Saddle Routing Policy
WASA '07 Proceedings of the International Conference on Wireless Algorithms,Systems and Applications
Detection of DDoS attack and defense against IP spoofing
Proceedings of the International Conference on Advances in Computing, Communication and Control
An efficient analytical solution to thwart DDoS attacks in public domain
Proceedings of the International Conference on Advances in Computing, Communication and Control
DoSTRACK: a system for defending against DoS attacks
Proceedings of the 2009 ACM symposium on Applied Computing
High performance traffic shaping for DDoS mitigation
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
LACAS: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Data aggregation in sensor networks using learning automata
Wireless Networks
Dynamic algorithms for the shortest path routing problem: learning automata-based solutions
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Routing security in wireless ad hoc networks
IEEE Communications Magazine
A survey on wireless mesh networks
IEEE Communications Magazine
Energy-balanced sampling workload allocation in wireless sensor networks
Computers & Mathematics with Applications
Hi-index | 0.09 |
Wireless Mesh Networks (WMNs) have potentially unlimited applications in the future. Therefore, establishing a viable and secure wireless network routing protocol for these networks is essential. Currently, these networks are being used in connecting large sections of cities by setting up wireless routers at strategic points all around the city. These networks can also support connecting remote areas of the country, instead of having to lay a cable all the way. The nature of applications mentioned above make these networks prone to different attacks. Thus, security of these networks is a serious concern. In this paper, we study the impact of Distributed Denial of Service (DDoS) attacks on WMNs. We base our work on the existing Optimized Link State Routing protocol (OLSR) and we weave in concepts of Learning Automata (LA) to protect the network from this kind of attack. The simulation results for the proposed scheme show that the proposed protocol is effective in the prevention of DDoS attacks in WMNs.