Novel Defense Mechanism against Data Flooding Attacks in Wireless Ad Hoc Networks

  • Kim H
  • Chitti R
  • Song J
  • 1


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.

Author-supplied keywords

  • Data flooding attack
  • burst traffic
  • throughput
  • wireless ad hoc network

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • H Kim

  • R B Chitti

  • J Song

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free