2011
DOI: 10.5120/2477-3333
|View full text |Cite
|
Sign up to set email alerts
|

A Flow Monitoring based Distributed Defense Technique for Reduction of Quality Attacks in MANET

Abstract: Reduction of Quality (ROQ) attack is one of the Denial of Service (DoS) attacks which affect the MANETs. Instead of refusing the clients from the services completely, these RoQ attacks throttle the TCP throughput heavily and reduce the QoS to end systems. To mitigate this RoQ attack in MANET, we propose to design a distributed defense technique in this paper. Initially, a mechanism for monitor node selection is designed such that the monitoring nodes should cover the entire network. These monitoring nodes esti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
4
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…Also it empowers individual nodes to maintain global flow state which in turn enables them to both setup and enforce bandwidth limits in a distributed fashion. S.Venkatasubramanian and N.P.Gopalan [10] have proposed a distributed defense technique to mitigate the DoS attacks. The technique for monitoring the node selection is designed that detects all affected packets while selecting the monitoring nodes so as to cover the entire network.…”
Section: Related Workmentioning
confidence: 99%
“…Also it empowers individual nodes to maintain global flow state which in turn enables them to both setup and enforce bandwidth limits in a distributed fashion. S.Venkatasubramanian and N.P.Gopalan [10] have proposed a distributed defense technique to mitigate the DoS attacks. The technique for monitoring the node selection is designed that detects all affected packets while selecting the monitoring nodes so as to cover the entire network.…”
Section: Related Workmentioning
confidence: 99%
“…Through the deep research, extensive usage of the MANET and Wireless Sensor Network (WSN) [4], opportunistic networks deny routing model in the traditional network, and improve the stability of path. Although Epidemic routing protocol [5], Spray and Wait routing protocol [6] that are based on encoding routing protocol can reduce TTL, they can cause much network overhead and ignore to improve QoS [7]. Probabilistic Routing Protocol using History of Encounters and Transitivity (PROPHET) is a kind of probabilistic routing protocol, which can transmit messages by encountering probability of nodes.…”
Section: Introductionmentioning
confidence: 99%
“…As the packet drop increases, it also affects the packet delivery ratio, routing load and throughput etc [10,12]. Packet flow is monitored and when packet drops increases, it causes a frequent change in sequence number and when it crosses a threshold limit, then alarm is raised and finally malicious nodes are removed from network on the basis of losses caused by them [11,14]. One of the major reasons to address the security aspects in MANETS is the usage of wireless transmission medium, which is highly susceptible or vulnerable to attacks.…”
Section: Introductionmentioning
confidence: 99%