2011
DOI: 10.4028/www.scientific.net/amr.204-210.395
|View full text |Cite
|
Sign up to set email alerts
|

Research of Secure Scheme against Data Flooding Attack in Ad Hoc Networks

Abstract: DATA flooding attack is a serious menace for the security of on-demand routing protocol in Ad Hoc networks. In the paper, on the basis of three typical on-demand routing protocols AODV, DSR and TORA, we present a special security scheme against data flooding attack. Then we simulate the scheme on NS2 platform and compare two performance parameters before and after using the scheme: average delay and packet delivery rate. The results indicate that this project is comparatively effective to resist the DATA flood… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…It is divided into a plurality of time slots in the stable data transmission stage that each cluster member communicates to the cluster head in its time slot. The time of the stable data transmission is much more than the time of the establishment stage which save unnecessary energy consumed that the clusters change frequently [6][7][8][9] .…”
Section: Improvementioning
confidence: 99%
“…It is divided into a plurality of time slots in the stable data transmission stage that each cluster member communicates to the cluster head in its time slot. The time of the stable data transmission is much more than the time of the establishment stage which save unnecessary energy consumed that the clusters change frequently [6][7][8][9] .…”
Section: Improvementioning
confidence: 99%