Mobility

Efficient Techniques to Detect the Various Attacks in Ad-Hoc Network

Download Now Free registration required

Executive Summary

This paper is mainly focused on Denial of Service (DoS) attack, where a server or a node cannot give service to the other nodes as it is under an attack. There are various attacks in the Ad hoc network but their paper is mainly focused on two types of DoS attacks viz SYN-Flooding and Worm-Hole attacks. How the authors can detect any one of attacks is addressed in this paper. They have discussed the CPU and memory utilization during the attack. They have given two separate algorithms for each attack and also suggest how to get rid of this type of attacks.

  • Format: PDF
  • Size: 217.1 KB