JAM: Mitigating jellyfish attacks in wireless ad hoc networks

9Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In recent years, wireless ad hoc networks (WANETs) have become very popular due to their wide range of applications and their ability to be deployed under normal and harsh conditions while supporting high data rates. Although many intrusion detection and trust-based systems have been developed to protect ad hoc networks against misbehaviors such as rushing attacks, query-flood attacks, and selfishness of nodes, these defense mechanisms are still not able to detect protocol compliant attacks called Jellyfish (JF) attacks. They target closed-loop flows such as TCP that are responsive to network conditions like delay and packet losses and can easily partition the network. In this paper, we introduce a security scheme called JAM (Jellyfish Attacks Mitigator) which can be used to detect and mitigate Jellyfish attacks in ad hoc networks. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Samad, F., Abu Ahmed, Q., Shaikh, A., & Aziz, A. (2012). JAM: Mitigating jellyfish attacks in wireless ad hoc networks. In Communications in Computer and Information Science (Vol. 281 CCIS, pp. 432–444). https://doi.org/10.1007/978-3-642-28962-0_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free