Prevention of flooding attacks in mobile ad hoc networks

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Mobile ad hoc network (MANET) in spite of having numerous advantages is still vulnerable to various security breaches. Most of the attacks in MANET are initiated during route discovery process. Flooding attack is found to be most destructive because its severity often leads to exhaustion of resources and bandwidth of MANET. In this paper in order to confront the flooding attack, a new two-step protection method (TSPM) is proposed. The analysis of obtained simulation results with the proposed TSPM establishes that the proposed method detects and isolates the attackers efficiently.

Cite

CITATION STYLE

APA

Kaur, G., Jain, V. K., & Chaba, Y. (2019). Prevention of flooding attacks in mobile ad hoc networks. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 27, pp. 193–201). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-030-11437-4_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free