Security in MANET Against DDoS Attack

Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 7, Issue 1

Abstract

Mobile ad-hoc network is a group of two or more devices or nodes with the capability of  communication and networking. It is an infrastructure less network. Such network may operate by them or may be connected to a larger internet. Due to its mobility and self routing capability nature, there are many weaknesses in its security. The security of the network from various attacks is an important issue in MANET application now days. Due to the dynamically changing topology, open environment and lack of centralized security infrastructure, a mobile ad hoc network (MANET) is vulnerable to many attacks. This paper focuses on mobile ad hoc network's routing vulnerability and analyzes the network performance under Distributed Denial of Service MANETS. The resistive schemes against these attacks were proposed for Ad hoc on demand Distance Vector (AODV) routing protocol and the effectiveness of the schemes is validated using NS2 simulations.

Authors and Affiliations

V. K aviyarasu , S. Baskaran

Keywords

Related Articles

Significance of Web 2.0 Technology and its Application in Academic Libraries

The objective of this paper is to provide information of web 2.0 technology in context of academic libraries. Web 2.0 technologies have seen the sudden increase of social networking sites or tools, which provide a medium...

Novel Design and Implementation of Topology and Orchestration Specification for Cloud Applications to enable Portability

In this paper we provide a novel design and implementation of toplogy and orchestration specification for cloud applications to enable portability

Software Platforms for Mobile Distributed Systems

As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...

Enhancing Adaptive Content Based Face Image Retrieval in Database

To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image...

Harmony Search Optimization in K-Means Clustering

Clustering is a data mining technique that classifies a set of observations into clusters based on some similarity measures. The most commonly used partitioning based clustering algorithm is K-means. However, the K-means...

Download PDF file
  • EP ID EP93837
  • DOI -
  • Views 86
  • Downloads 0

How To Cite

V. K aviyarasu, S. Baskaran (2014). Security in MANET Against DDoS Attack. INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY, 7(1), 47-51. https://europub.co.uk/articles/-A-93837