Implementation of Energy Aware Secure Routing Protocol over Flooding Environment in MANET

被引:0
作者
Sawant, Khushboo [1 ]
Rawat, Manoj Kumar [1 ]
Jain, Aakansha [2 ]
机构
[1] LNCT, Comp Sci, Indore, Madhya Pradesh, India
[2] IIST, Informat Technol, Indore, Madhya Pradesh, India
来源
2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4) | 2015年
关键词
Flooding Attack; Energy Awareness; style; RREQ; DOS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most up-and-coming fields for research is mobile ad hoc network. Therefore independent nods mobility is an essential property of network. In these networks the routing protocol played important role in route discovery between communicating nodes. Due to this the network suffers from the performance issues. Among them security is main area of concern in the presented work. In this paper, we are clarify the incident of flooding attack and their exposed to the possibility of being attacked or harmed effects which give chance to a legitimate node for doing dissimilar attacks also. So we get going towards is to recognize the presence or existence of DOS flooding attack using secure routing protocols.
引用
收藏
页数:5
相关论文
共 20 条
  • [1] Abel Vikas Solomon, 2011, IJCSE, V3
  • [2] Ade S.A., 2010, INT J INF TECH KNOWL, V2, P545
  • [3] Ahmed Sarah, 2013, INT C INFO SCI APPL
  • [4] [Anonymous], 2012, INT J COMPUTERAPPL, V41
  • [5] [Anonymous], 2010, INT J COMPUTER APPL
  • [6] Arunmozhi S.A., 2011, INT J NETWORK SECURI, V3, DOI [10.5121/ijnsa.2011.3312, DOI 10.5121/IJNSA.2011.3312]
  • [7] Bharathidasan A., Sensor networks: An overview
  • [8] Bhuvaneshwari K, INT J ADVANCEDNETWOR, V04, P1695
  • [9] Chaba Y., 2009, J NETWORKS, V4, P178
  • [10] Chhabra M., 2014, Res. J. Appl. Sci., Eng. Technol., V7, P2033