Milcom 2006 2006
DOI: 10.1109/milcom.2006.302178
|View full text |Cite
|
Sign up to set email alerts
|

Understanding Dynamic Denial of Service Attacks in Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 48 publications
(29 citation statements)
references
References 14 publications
0
29
0
Order By: Relevance
“…Fei Xing [2012] et al In this paper, exhibit a profound recognition into DOS attacks and their impacts on MANETs. To begin with, we examine the node isolation, trouble resulting to DOS attacks and determine the probability of node isolation which proposes that the DOS attacks abusing false routing messages, for example, Black Hole attack, affects the availability much severer than different attacks [15].…”
Section: Literature Surveymentioning
confidence: 98%
See 1 more Smart Citation
“…Fei Xing [2012] et al In this paper, exhibit a profound recognition into DOS attacks and their impacts on MANETs. To begin with, we examine the node isolation, trouble resulting to DOS attacks and determine the probability of node isolation which proposes that the DOS attacks abusing false routing messages, for example, Black Hole attack, affects the availability much severer than different attacks [15].…”
Section: Literature Surveymentioning
confidence: 98%
“…The mechanisms described right here seek to restrict the injury sustained by way of ad hoc networks from intrusion attacks and permit for continued network operation at an acceptable degree during such attacks [16].…”
Section: Literature Surveymentioning
confidence: 99%
“…In 2006 [11] the authors presented a dynamic DOS attack, the one which may also be characterized by using exploiting the node mobility, dynamic power manage, and compromised nodes to takeoff new DOS attacks dynamically. Malicious nodes may be competent to move across the whole network, to adjust the transmission power dynamically, or even launch DOS attacks by compromising their cooperative neighbors.…”
Section: Literature Surveymentioning
confidence: 99%
“…A DoS attack benefit by vulnerabilities of link layer protocols, network layer protocols and MAC layer protocols. Further in network layer it is classified into three types; routing disruption, forwarding disruption and resource consumption attacks (Xing and Wang, 2006).…”
Section: Denial Of Service (Dos) Attacks In Manetmentioning
confidence: 99%