English  |  正體中文  |  简体中文  |  Items with full text/Total items : 21921/27947 (78%)
Visitors : 4201465      Online Users : 1152
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version


    Please use this identifier to cite or link to this item: http://140.128.103.80:8080/handle/310901/24941


    Title: A petri net design toward prolonging operational lifetime of ad hoc networks under flooding attack
    Authors: Jiang, F.-C.;Wu, H.-W.;Lin, C.-H.;Liao, I.-E.;Hsu, C.-H.
    Contributors: Department of Computer Science, TungHai University
    Keywords: AODV;Compromised nodes;Destination nodes;Flooding attacks;Mobile adhoc network (MANETs);Network simulation;Operational lifetime;Qualitative analysis;Computer simulation;Floods;Information technology;Petri nets;Mobile ad hoc networks
    Date: 2013-12-18
    Issue Date: 2014-06-20T02:05:25Z (UTC)
    Publisher: Danang
    Abstract: The mobile ad hoc networks (MANETs) are vulnerable to flooding attacks launched through compromised nodes or intruders. One crucial type of flooding attacks called RREQ flooding appears to be inevitably proliferated in wireless network. For the RREQ flooding attack, attackers would launch massive RREQ packets with out-of-domain IP address being its destination node. The proposed approach can suppress redundant RREQ packets by the co-operation of destination node and neighbor nodes under one-hop range of attacking node. Much of useless RREQ packets can then be avoided to transmit and receive by legal nodes. In other words, the massive saving of radio energy in MANET can prolong the lifetime of the MANET. To model the proposed approach for qualitative analysis, a Petri Net has been designed to model all relevant system aspects in a concise fashion. On quantitative viewpoint, relevant network simulations have been conducted to validate the proposed scheme approaching the practical scenario. The experimental results reveal that a significant improvement level on lifetime elongation for the MANET can be achieved. ? Springer-Verlag Berlin Heidelberg 2014.
    Relation: 8th International Conference on Ubiquitous Information Technologies and Applications, CUTE 2013
    Lecture Notes in Electrical Engineering,V.280 LNEE,P.123-130
    Appears in Collections:[資訊工程學系所] 會議論文

    Files in This Item:

    There are no files associated with this item.



    All items in THUIR are protected by copyright, with all rights reserved.


    本網站之東海大學機構典藏數位內容,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。

    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback