Article Information  
Illustration, Detection & Prevention of Sleep Deprivation Anomaly in Mobile Ad Hoc Networks

Keywords: Anomaly Detection and Prevention, Mobile Ad Hoc Network, Security, Sleep Deprivation

Mehran University Research Journal of Engineering & Technology

Volume 36 ,  Issue 2

ADNAN   NADEEM , KAMRAN AHSAN   , MUHAMMAD SARIM   ,

References
1. Nadeem, A., and Howarth, M., "A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks", IEEE Journal of Communication Survey and Tutorial, Volume 15, No. 4, pp 2027-2045, 2013, Canada.
2. Yi. P., Dai, Z., and Zhang, S., "Resisting Flooding Attack in Ad Hoc Networks", IEEE Internal Conference on Information Technology Coding & Computing, pp. 657- 662, LV, USA, April 2005.
3. Choube, C., and Murli, M., "Detection of Route Request Flooding Attack in MANET Using Session Based History Table", International Journal of Innovative Science, Engineering & Technology, Volume 2, No. 4, pp. 348-352, Indian, April, 2015
4. Nadeem, A., "An Intrusion Detection and Prevention Mechanism for Mobile Ad Hoc Network", Ph.D. Thesis, Centre for Communication System Research, University of Surrey, UK, January, 2011.
5. Martin, T., Hsiao, M., Dong, H., and Krishnaswami, J., "Denial-of-Service Attacks on Battery Powered Mobile Computers", Proceedings of IEEE 2nd International Conference on Pervasive Computing & Communications, Florida, USA, March, 2004
6. Verma, S.S., Patel, R.B., and Lenka, S.K., "Investigating Variable Time Flood Request Impact Over QOS in MANET", Elsevier 3rd International Conference on Recent Trends in Computing, India, 2015.
7. Yu, W., and Ray, K., "Defense Against Injecting Traffic Attack in Cooperative Ad Hoc Networks", Proceedings of IEEE Conference on GLOBECOM, Louis, MO, December, 2005
8. "KDD Data Set Used" 3rd International Knowledge Discovery and Data Mining Tool Competition (Available: URL:http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, 1999.
9. Deng, H., and Agrawal, D.P., "TIDS: Threshold and Identity Based Security Scheme for Wireless Ad Hoc Networks", Journal of Ad Hoc Networks, Volume 2, No 3, 291-307, Netherland, 2004.
10. Dahshan, H., and Irvine, J., "A Trust based Threshold Cryptography Key Management for Mobile Ad Hoc Networks", IEEE Conference on Vehicular Technology, pp. 1-9, USA, September 2009.
11. Gonzalez-Duque, O.F., Hadjiantonis, A.M., Pavlou, G., and Howarth, M., "Adaptive Misbehaviour Detection and Isolation in Wireless Ad Hoc networks Using Policies", IFIP/IEEE International Symposium on Integrated Network Management, pp 242-255, NY, USA, 2009.
12.