A novel approach for mitigating route request flooding attack in MANET
Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for
establishing the communication path among nodes is that the nodes should be cooperative …
establishing the communication path among nodes is that the nodes should be cooperative …
Security upgrade against RREQ flooding attack by using balance index on vehicular ad hoc network
MJ Faghihniya, SM Hosseini, M Tahmasebi - Wireless Networks, 2017 - Springer
VANET is an ad hoc network that formed between vehicles. Security in VANET plays vital
role. AODV routing protocol is a reactive or on-demand routing protocol which means if there …
role. AODV routing protocol is a reactive or on-demand routing protocol which means if there …
Defending against flooding attacks in mobile ad-hoc networks based on statistical analysis
P Mohammadi, A Ghaffari - Wireless Personal Communications, 2019 - Springer
Due to their specific structure and plenty of their utilization, mobile ad-hoc networks are
vulnerable to various attacks. An attack which impacts on network layer is referred to as …
vulnerable to various attacks. An attack which impacts on network layer is referred to as …
Coalition game-based secure and effective clustering communication in vehicular cyber-physical system (VCPS)
Y Huo, W Dong, J Qian, T Jing - Sensors, 2017 - mdpi.com
In this paper, we address the low efficiency of cluster-based communication for the
crossroad scenario in the Vehicular Cyber-Physical System (VCPS), which is due to the …
crossroad scenario in the Vehicular Cyber-Physical System (VCPS), which is due to the …
FA-AODV: flooding attacks detection based ad hoc on-demand distance vector routing protocol for VANET
BA Tosunoglu, C Koçak - Sakarya University Journal of …, 2022 - saucis.sakarya.edu.tr
Vehicular Ad-Hoc Networks (VANET) is anticipated to be the most effective way of
increasing performance and safety in transportation in the near future. VANETs are the sub …
increasing performance and safety in transportation in the near future. VANETs are the sub …
Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding Attack
A Alzahrani, N Thomas - Applied Sciences, 2024 - mdpi.com
Mobile ad hoc networks (MANETs) are wireless multi-hop networks that do not rely on any
fixed infrastructure, unlike traditional networks. Nodes in MANETs are formed dynamically …
fixed infrastructure, unlike traditional networks. Nodes in MANETs are formed dynamically …
Defending MANETs against flooding attacks for military applications under group mobility
T Kaur, AS Toor, KK Saluja - 2014 recent advances in …, 2014 - ieeexplore.ieee.org
MANET is an assembly of mobile nodes having the capability of configure any momentarily
network without the assistance of any established infrastructure or centralized supervision …
network without the assistance of any established infrastructure or centralized supervision …
RREQ flood attack and its mitigation in ad hoc network
S Rani, B Narwal, AK Mohapatra - … 2017, Gurgaon, India, October 13-14 …, 2018 - Springer
RREQ Flood Attack is one of the prominent attack in Wireless Adhoc Network. In the flood
attack, a malicious node fills up all the routing tables with its own packets and hence …
attack, a malicious node fills up all the routing tables with its own packets and hence …
[PDF][PDF] An efficient RREQ flooding attack avoidance technique for adaptive wireless network
Mobile Ad Hoc networks (MANETs) are wireless networks which is infrastructure less means
it does not require any central administrator for communication between mobile nodes. Due …
it does not require any central administrator for communication between mobile nodes. Due …
Detection of RREQ Flooding Attacks in MANETs
B Nithya, A Nair, AS Sreelakshmi - Data and Communication Networks …, 2019 - Springer
Abstract Mobile Ad hoc Networks (MANETs) are prone to vulnerabilities as a result of lack of
centralized management, dynamic topologies, and predefined boundary. There are many …
centralized management, dynamic topologies, and predefined boundary. There are many …