完整後設資料紀錄
DC 欄位語言
dc.contributor.authorLin, Yi-Hsing Jr
dc.contributor.authorLin, Chu-Hsing Jr
dc.date.accessioned2011-03-24T23:42:31Z
dc.date.accessioned2020-05-18T03:22:04Z-
dc.date.available2011-03-24T23:42:31Z
dc.date.available2020-05-18T03:22:04Z-
dc.date.issued2011-03-24T23:42:31Z
dc.date.submitted2009-11-27
dc.identifier.urihttp://dspace.lib.fcu.edu.tw/handle/2377/30135-
dc.description.abstractMobile ad hoc networks often deployed in many kinds of environments and the nodes in the network are unattended and have weak physical protection against attacks. Mobile ad hoc networks are particularly vulnerable to Denial of Service attacks. Flooding denial of service attacks are new and powerful attacks against on-demand Ad Hoc routing protocols. At present, the single scheme proposed to resist such attack is Flooding Attack Prevention proposed in 2005. And another new scheme to resist this kind of attacks be proposed in 2006 is Avoid Mistaken Transmission Table. In this paper, we present a new and more efficient solution to inhibit flooding attack in Mobile ad hoc networks. In our scheme, legal nodes can use Priority and Trust Value and Neighbor Nodes List Table to distinguish attack nodes and refuse to forward packages for them, in this way flooding attacks can be defended. Through analysis, we show that our scheme can inhibit flooding attacks at less cost and is more efficient.
dc.description.sponsorshipNational Taipei University,Taipei
dc.format.extent8p.
dc.relation.ispartofseriesNCS 2009
dc.subjectFlooding attack
dc.subjectFAP
dc.subjectAMTT
dc.subjectTrust and Priority Value
dc.subjectNNLT
dc.subjectupgrade downgrade
dc.subjectRREQ threshold
dc.subjectDATA threshold
dc.subject.otherWorkshop on Cryptography and Information Security
dc.titleA Priority and Trust Value Scheme to Inhibit the Flooding Attack in Ad Hoc Networks
分類:2009年 NCS 全國計算機會議

文件中的檔案:
檔案 描述 大小格式 
CI01B01.pdf101.55 kBAdobe PDF檢視/開啟


在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。