TCP/IP illustrated (vol. 1): the protocols
TCP/IP illustrated (vol. 1): the protocols
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Comparison of broadcasting techniques for mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Resisting Flooding Attacks in Ad Hoc Networks
ITCC '05 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II - Volume 02
On the impact of noise on mobile ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
Comparison of various passive distributed denial of service attack in mobile adhoc networks
EHAC'10 Proceedings of the 9th WSEAS international conference on Electronics, hardware, wireless and optical communications
Detect DDoS flooding attacks in mobile ad hoc networks
International Journal of Security and Networks
Hi-index | 0.00 |
The on demand routing protocols for mobile ad hoc networks use network-wide broadcasts of control packets to learn routes. This feature can be exploited by malicious nodes to launch highly leveraged denial of service attacks in ad hoc networks. We use an adaptive statistical packet dropping mechanism to mitigate such attacks and their impact on throughput. The proposed mechanism does not use any additional network bandwidth. Using experiments on a wireless testbed, we evaluate the effectiveness of the statistical technique for UDP and TCP traffic.