Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 6
Page No. 1023 - 1031

Thwart Distributed Denial of Service Attacks (DDOS) in Manet for Medical Image Transmission in Security Issue Hospital

Authors : S. Hemalatha and P.C. Senthil Mahesh

References

Anantvalee, T. and J. Wu, 2007. A Survey on Intrusion Detection in Mobile Ad Hoc Networks. In: Wireless Network Security, Xiao, Y., X. Shen and D.Z. Du (Eds.). Springer, New York, ISBN: 9780387331126, pp: 159-180.

Anjum, F., D. Subhadrabandhu and S. Sarkar, 2003. Signature based intrusion detection for wireless Ad-Hoc networks: A comparative study of various routing protocols. Proceedings of the IEEE 58th Conference on Vehicular Technology, Oct. 6-9, Morristown, New Jersey, USA., pp: 2152-2156.

Denning, D.E., 1987. An intrusion-detection model. IEEE Trans. Software Eng., SE-13: 222-232.
CrossRef  |  

Giannoulis, S., C. Antonopoulos, E. Topalis and S. Koubias, 2005. ZRP versus DSR and TORA: A comprehensive survey on ZRP performance. Proceedings of the 10th IEEE Conference on Emerging Technologies and Factory Automation, Volume 1, September 19-22, 2005, Catania, Italy -.

Islam, M.S. and S.A. Rahman, 2011. Anomaly intrusion detection system in wireless sensor networks: Security threats and existing approaches. Int. J. Adv. Sci. Technol., 36: 1-8.
Direct Link  |  

Kachirski, O. and R. Guha, 2003. Effective intrusion detection using multiple sensors in wireless ad hoc networks. Proceedings of the 36th Annual Hawaii International Conference on System Sciences, Volume 2, January 6-9, 2003, Hawaii, USA -.

Karygiannis, A., E. Antonakakis and A. Apostolopoulos, 2006. Detecting critical nodes for MANET intrusion detection systems. Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, June 29-29, 2006, Lyon, France -.

Marchang, N. and R. Datta, 2008. Collaborative techniques for intrusion detection in mobile ad-hoc networks. Ad Hoc Networks, 6: 508-523.
CrossRef  |  Direct Link  |  

Perkins, C.E. and E.M. Royer, 1999. Ad-hoc on-demand distance vector routing. Proceedings of the 2nd Workshop on Mobile Computing Systems and Applications, February 25-26, 1999, New Orleans, LA., pp: 90-100.

Rajaram, A. and D.S. Palaniswami, 2010. Malicious node detection system for mobile ad hoc networks. Int. J. Comput. Sci. Inform. Technol., 1: 77-85.
Direct Link  |  

Rajaram, M. and R. Ranjana, 2007. Detecting intrusion attacks in ADHOC networks. Asia J. Inform. Technol., 6: 758-761.
Direct Link  |  

Stamouli, I., P.G. Argyroudis and H. Tewari, 2005. Real-time intrusion detection for ad hoc networks. Proceedings of the 6th IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, June 13-16, 2005, Taormina, Italy, pp: 374-380.

Sun, B., K. Wu and U.W. Pooch, 2003. Zone-based intrusion detection for mobile ad hoc networks. Int. J. Ad Hoc Sensor Wireless Networks, Vol. 2, No. 3.

Zhang, G.Y. and W. Lee, 2000. Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 275-283.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved