Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07) 2007
DOI: 10.1109/isads.2007.59
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Resource Exhaustion Attacks in Ad Hoc Networks

Abstract: The importance of security has been recognized in ad hoc networks for many years. Consequently many secure routing methods have been proposed in this field. This paper discusses major security attacks in ad hoc networks, and proposes a number of prevention methods for resource exhaustion attacks that have severe negative effects on targeted ad hoc networks.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Among these attacks, resource exhaustion attacks are the most difficult to prevent and their effects are severe, and therefore we proposed a number of countermeasures against resource exhaustion attacks in mobile ad hoc networks [7]. These countermeasures can also defend against denial of service attacks.…”
Section: Figure 1 An Example Of Mobile Ad Hoc Network and An Attack T...mentioning
confidence: 99%
See 1 more Smart Citation
“…Among these attacks, resource exhaustion attacks are the most difficult to prevent and their effects are severe, and therefore we proposed a number of countermeasures against resource exhaustion attacks in mobile ad hoc networks [7]. These countermeasures can also defend against denial of service attacks.…”
Section: Figure 1 An Example Of Mobile Ad Hoc Network and An Attack T...mentioning
confidence: 99%
“…As we studied before [7], in the case with no prevention method, all terminals consume their batteries at the same rate as transmitting beacon signals frequently. However, in the case of using the proposed secure communication method, even members that receive packets from the attacker directly consume their batteries only a little earlier than the others and the others' batteries do not suffer the attack effect.…”
Section: Evaluation In the Point Of Secure Communicationmentioning
confidence: 99%
“…Resource exhaustion attacks: Such attacks aim to increase the use of UAV resources. Although UAV functionality may not be violated, power consumption increases [10].…”
mentioning
confidence: 99%