Mehran University Research Journal Of Engineering &
Technology (HEC Recognized In Category "X")
Publishing Since 1982.

For Authors
For Readers
Article Information  
Illustration, Detection & Prevention of Sleep Deprivation Anomaly in Mobile Ad Hoc Networks

Keywords: Anomaly Detection and Prevention, Mobile Ad Hoc Network, Security, Sleep Deprivation

Mehran University Research Journal of Engineering & Technology

Volume 36 ,  Issue 2


2. Gonzalez-Duque, O.F., Hadjiantonis, A.M., Pavlou, G., and Howarth, M., "Adaptive Misbehaviour Detection and Isolation in Wireless Ad Hoc networks Using Policies", IFIP/IEEE International Symposium on Integrated Network Management, pp 242-255, NY, USA, 2009.
3. Dahshan, H., and Irvine, J., "A Trust based Threshold Cryptography Key Management for Mobile Ad Hoc Networks", IEEE Conference on Vehicular Technology, pp. 1-9, USA, September 2009.
4. Deng, H., and Agrawal, D.P., "TIDS: Threshold and Identity Based Security Scheme for Wireless Ad Hoc Networks", Journal of Ad Hoc Networks, Volume 2, No 3, 291-307, Netherland, 2004.
5. "KDD Data Set Used" 3rd International Knowledge Discovery and Data Mining Tool Competition (Available: URL: kddcup99.html, 1999.
6. Yu, W., and Ray, K., "Defense Against Injecting Traffic Attack in Cooperative Ad Hoc Networks", Proceedings of IEEE Conference on GLOBECOM, Louis, MO, December, 2005
7. Verma, S.S., Patel, R.B., and Lenka, S.K., "Investigating Variable Time Flood Request Impact Over QOS in MANET", Elsevier 3rd International Conference on Recent Trends in Computing, India, 2015.
8. Martin, T., Hsiao, M., Dong, H., and Krishnaswami, J., "Denial-of-Service Attacks on Battery Powered Mobile Computers", Proceedings of IEEE 2nd International Conference on Pervasive Computing & Communications, Florida, USA, March, 2004
9. Nadeem, A., "An Intrusion Detection and Prevention Mechanism for Mobile Ad Hoc Network", Ph.D. Thesis, Centre for Communication System Research, University of Surrey, UK, January, 2011.
10. Choube, C., and Murli, M., "Detection of Route Request Flooding Attack in MANET Using Session Based History Table", International Journal of Innovative Science, Engineering & Technology, Volume 2, No. 4, pp. 348-352, Indian, April, 2015
11. Yi. P., Dai, Z., and Zhang, S., "Resisting Flooding Attack in Ad Hoc Networks", IEEE Internal Conference on Information Technology Coding & Computing, pp. 657- 662, LV, USA, April 2005.
12. Nadeem, A., and Howarth, M., "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", IEEE Journal of Communication Survey and Tutorial, Volume 15, No. 4, pp 2027-2045, 2013, Canada.