Illustration, Detection & Prevention of Sleep Deprivation Anomaly in Mobile Ad Hoc Networks
Keywords: Anomaly Detection and Prevention, Mobile Ad Hoc Network, Security, Sleep Deprivation
Mehran University Research Journal of Engineering & Technology
Volume 36 , Issue 2
ADNAN NADEEM , KAMRAN AHSAN , MUHAMMAD SARIM ,
References
1. |
Nadeem, A., and Howarth, M., "A Survey of MANET
Intrusion Detection & Prevention Approaches for
Network Layer Attacks", IEEE Journal of Communication Survey and Tutorial, Volume 15, No. 4,
pp 2027-2045, 2013, Canada. |
2. |
Yi. P., Dai, Z., and Zhang, S., "Resisting Flooding Attack
in Ad Hoc Networks", IEEE Internal Conference on
Information Technology Coding & Computing, pp. 657-
662, LV, USA, April 2005. |
3. |
Choube, C., and Murli, M., "Detection of Route Request
Flooding Attack in MANET Using Session Based History
Table", International Journal of Innovative Science,
Engineering & Technology, Volume 2, No. 4,
pp. 348-352, Indian, April, 2015 |
4. |
Nadeem, A., "An Intrusion Detection and Prevention
Mechanism for Mobile Ad Hoc Network", Ph.D. Thesis,
Centre for Communication System Research, University
of Surrey, UK, January, 2011. |
5. |
Martin, T., Hsiao, M., Dong, H., and Krishnaswami, J.,
"Denial-of-Service Attacks on Battery Powered Mobile
Computers", Proceedings of IEEE 2nd International
Conference on Pervasive Computing & Communications,
Florida, USA, March, 2004 |
6. |
Verma, S.S., Patel, R.B., and Lenka, S.K., "Investigating
Variable Time Flood Request Impact Over QOS in
MANET", Elsevier 3rd International Conference on
Recent Trends in Computing, India, 2015. |
7. |
Yu, W., and Ray, K., "Defense Against Injecting Traffic
Attack in Cooperative Ad Hoc Networks", Proceedings
of IEEE Conference on GLOBECOM, Louis, MO,
December, 2005 |
8. |
"KDD Data Set Used" 3rd International Knowledge
Discovery and Data Mining Tool Competition (Available:
URL:http://kdd.ics.uci.edu/databases/kddcup99/
kddcup99.html, 1999. |
9. |
Deng, H., and Agrawal, D.P., "TIDS: Threshold and
Identity Based Security Scheme for Wireless Ad Hoc
Networks", Journal of Ad Hoc Networks, Volume 2, No
3, 291-307, Netherland, 2004. |
10. |
Dahshan, H., and Irvine, J., "A Trust based Threshold
Cryptography Key Management for Mobile Ad Hoc
Networks", IEEE Conference on Vehicular Technology,
pp. 1-9, USA, September 2009. |
11. |
Gonzalez-Duque, O.F., Hadjiantonis, A.M., Pavlou, G.,
and Howarth, M., "Adaptive Misbehaviour Detection
and Isolation in Wireless Ad Hoc networks Using
Policies", IFIP/IEEE International Symposium on
Integrated Network Management, pp 242-255, NY,
USA, 2009. |
12. |
|
|
|
|