TY - GEN
T1 - Period-based defense mechanism against malicious data packet flooding attacks in wireless ad hoc networks
AU - Kim, Hyojin
AU - Song, Jooseok
PY - 2010
Y1 - 2010
N2 - Malicious data packet flooding attacks interfere with services of a victim node such as laptop computer, cellular phone, etc. in wireless ad hoc networks. The victim node is hard to distinguish traffics performing data packet flooding attacks from normal burst traffics. Hence, this paper proposes a period-based scheme so as to prevent from malicious data packet flooding attacks with enhancing the throughput of burst traffics. The simulation results show that the proposed scheme enhances the throughput of burst traffics.
AB - Malicious data packet flooding attacks interfere with services of a victim node such as laptop computer, cellular phone, etc. in wireless ad hoc networks. The victim node is hard to distinguish traffics performing data packet flooding attacks from normal burst traffics. Hence, this paper proposes a period-based scheme so as to prevent from malicious data packet flooding attacks with enhancing the throughput of burst traffics. The simulation results show that the proposed scheme enhances the throughput of burst traffics.
UR - http://www.scopus.com/inward/record.url?scp=77950105621&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=77950105621&partnerID=8YFLogxK
U2 - 10.1109/ICCE.2010.5418933
DO - 10.1109/ICCE.2010.5418933
M3 - Conference contribution
AN - SCOPUS:77950105621
SN - 9781424443161
T3 - ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics
SP - 175
EP - 176
BT - ICCE 2010 - 2010 Digest of Technical Papers International Conference on Consumer Electronics
T2 - 2010 International Conference on Consumer Electronics, ICCE 2010
Y2 - 11 January 2010 through 13 January 2010
ER -