Wazid et al., 2013 - Google Patents
E-TCP for efficient performance of MANET under JF delay variance attackWazid et al., 2013
- Document ID
- 18439350181795272759
- Author
- Wazid M
- Katal A
- Sachan R
- Goudar R
- Publication year
- Publication venue
- 2013 IEEE Conference on Information & Communication Technologies
External Links
Snippet
MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial Of service (DoS) attack, the most common of all, if occurs becomes difficult to …
- 241000242583 Scyphozoa 0 abstract description 60
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/24—Flow control or congestion control depending on the type of traffic, e.g. priority or quality of service [QoS]
- H04L47/2441—Flow classification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/19—Flow control or congestion control at layers above network layer
- H04L47/193—Flow control or congestion control at layers above network layer at transport layer, e.g. TCP related
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/12—Congestion avoidance or recovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
- H04L47/32—Packet discarding or delaying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/26—Monitoring arrangements; Testing arrangements
- H04L12/2602—Monitoring arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/08—Monitoring based on specific metrics
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Jain et al. | Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks | |
| Jhaveri | MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs | |
| Abu Zant et al. | Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV) | |
| Van Phuong et al. | Transmission time-based mechanism to detect wormhole attacks | |
| Pu | Energy depletion attack against routing protocol in the Internet of Things | |
| Wazid et al. | E-TCP for efficient performance of MANET under JF delay variance attack | |
| Singh et al. | A mechanism for discovery and prevention of coopeartive black hole attack in mobile ad hoc network using AODV protocol | |
| Katal et al. | A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission | |
| Sachan et al. | An approach to prevent Gray-hole attacks on Mobile Ad-Hoc Networks | |
| Agrawal et al. | Performance evaluation and comparison of aodv and dsr under adversarial environment | |
| Salem et al. | Efficient mechanism for mitigating multiple black hole attacks in MANETs | |
| Rani et al. | RREQ flood attack and its mitigation in ad hoc network | |
| Garg et al. | Reactive protocols analysis with wormhole attack in ad-hoc networks | |
| Annamalai et al. | Secured system against DDoS attack in mobile adhoc network | |
| Ghosh et al. | P-TCP: A prediction-based secure transmission control protocol for wireless ad hoc networks | |
| Omer | Impact of Jellyfish attack on routing protocols in TCP-based MANETs | |
| Chouhan et al. | A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique | |
| Brindha et al. | AOMDV-multipath routing protocol in mobile networks to enhance network security | |
| Bendale et al. | An improved blackhole attack detection and prevention method for wireless ad-hoc network | |
| Neerugatti et al. | Acknowledgement based technique for detection of the wormhole attack in RPL based Internet of Things networks | |
| Dahiya et al. | Design and Implementation of NAODV_ETCP to Handle Jelly Fish Attack | |
| Manikandan et al. | Mitigation of Malicious Nodes in MANET Using Sequence Number-Based Detection Mechanism | |
| Kumar et al. | Design and Efficient Network Investigation of Passive Periodic Drop Attack | |
| Bundela et al. | A secure routing in ad-hoc network | |
| Kumar et al. | A Policy based preventive measure against flooding attack in MANETs |