| International Journal of Nonlinear Analysis and Applications | ||
| Volume 12, Special Issue, January 0, Pages 2153-2166 PDF (559.75 K) | ||
| DOI: 10.22075/ijnaa.2021.6075 | ||
| Receive Date: 01 October 2021, Revise Date: 11 November 2021, Accept Date: 08 December 2021 | ||
| References | ||
|
[1] A. Yaar, A. Perrig and D. Song StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense, IEEE J. Sel. Areas Commun. 24(10) (2006) 1853–1863. [2] S. Agarwal, R.H. Katz, S.V. Krishnamurthy and S.K. Dao, Distributed power control in ad-hoc wireless networks, 12th IEEE Int. Symp. Personal, Indoor and Mobile Radio Commun. 2001. [3] K. Biswas and Md. Liakat Ali; Security Threats in Mobile Ad Hoc Network, Master Thesis Computer Science, 2007. [4] Y. Chaba, Y. Singh and A. Preeti, Performance analysis of disable IP broadcast technique for prevention of flooding-based DDoS attack in MANET, J. Networks 4(3) (2009) 178–183.[5] J. Chang and L. Tassiulas, Energy conserving routing in wireless ad-hoc networks, Proc. IEEE INFOCOM 2000, Conf. Comput. Commun. Nineteenth Annual Joint Conf. IEEE Comput. Commun. Soc. 2000. [6] S. Chen, Y. Tang and W. Du, Stateful DDoS attacks and targeted filtering, J. Netw. Comput. Appl. 30(3) (2007) 823–840. [7] X. Geng and A. Whinston, Defeating distributed denial of service attacks, IT Prof. 2(4) (2000) 36–42. [8] Huang et al, A cooperative intrusion detection system for Ad Hoc networks, Proc. ACM Workshop Secur. Ad Hoc Sensor Networks, Fairfax VA. (2003) 135–147. [9] M. Just, E. Kranakis and T. Wan, Resisting malicious packet dropping in wireless Ad-Hoc networks, Proc. 2nd Annual Conf. Adhoc Networks and Wireless (AD-HOCNOW’03), Montreal, Canada, 2003 pp. 151–163. [10] V. Kawadia and P.R. Kumar, Power control and clustering in ad hoc networks, Twenty-second Annual Joint Conf. IEEE Comput. Commun. Soc. (IEEE Cat. No.03CH37428), 2003. [11] R. Kravets and P. Krishnan, Power management techniques for mobile communication, Int. Conf. Mobile Comput. Network. USA, 1998, pp. 157–183. [12] V. Krpijoki, Security in Ad Hoc networks, IFIP Int. Conf. Personal Wireless Commun. 2003, pp. 756–775. [13] M. Kumar and N. Kumar, Study of attack prevention methods for DDOS attacks in manets, Int. J. Adv. Res. Comput. Sci. Eng. Inf. Technol. 2(8) (2012) 224–228. [14] S. Lim, Ch. Yu and R. Das, Random cast: An energy efficient communication scheme for mobile ad hoc networks, IEEE Trans. Mobile Comput. 8(8) (2009) 1039–1051. [15] P. Magula and M. Kotocova, Quality of service models for mobile Ad-hoc networks, Proc. 12th Int. Conf. Comput. Syst. Technol., Vienna, Austria, 2011. [16] S. Khan, K.-K. Loo, T. Naeem and M. Abrar Khan, Denial of service attacks and challenges in broadband wireless networks, Int. J. Netw. Secur. 8(7) (2008) 1–6. [17] S. Singh, M. Woo and C.S. Raghavendra, Power-aware routing in mobile Ad Hoc networks, Proc. 4th Annual ACM/IEEE, Int. Conf. Mobile Comput. Network., USA, 1998, pp. 181–190. [18] V.A. Siris and I Stavrakis, Provider-based deterministic packet marking against distributed DoS attacks, J. Netw. Comput. Appl. 30(3) (2007) 858–876. [19] S.M. Specht and R.B. Lee, Distributed denial of service: taxonomies of attacks, tools, and countermeasures, Proc. 17th Int. Conf. Paral. Distrib. Comput. Syst. 2004 Int. Workshop Secur. Paral. Distrib. Syst. 2004, pp. 543–550. [20] K. Woo, Ch. Yu, D. Lee, H. Yong Youn and B. Lee, Non-blocking, localized routing algorithm for balanced energy consumption in mobile ad hoc networks, Proc. Ninth Int. Symp. Model. Anal. Simul. Comput. Telecommun. Syst. 2001. [21] B. Xiao, W. Chen and Y. He, A novel approach to detecting DDoS attacks at an early stage, J. Supercomput. 36(3) (2006) 235–248. [22] Z. YaztiDemetrios, A Glance at Quality of Services in Mobile Ad-Hoc Networks, Technical Report. 2001. [23] X. Zeng, R. Bagrodia, M. Gerla, Glomosim: A library for parallel simulation of large-scale wireless networks, ACM SIGSIM Simul. Digest. 28(1) (1998) 154–161. [24] X. Zhou, C.Z. Xu, Distributed denial-of-service and intrusion detection, J. Netw. Comput. Appl. 30(3) (2007) 819–822. | ||
|
Statistics Article View: 44,201 PDF Download: 50,130 |
||