Please use this identifier to cite or link to this item: http://repository.aaup.edu/jspui/handle/123456789/679
Full metadata record
DC FieldValueLanguage
dc.contributor.authoradwan yasin
dc.contributor.authormahmoud abu zant
dc.date.accessioned2020-02-10T10:46:44Z-
dc.date.available2020-02-10T10:46:44Z-
dc.date.issued2019
dc.identifier.urihttp://repository.aaup.edu/jspui/handle/123456789/679-
dc.description.abstractSecurity in MANET is an essential task in preventing the harm that could be caused by malicious nodes in the network. Flooding attack is one of DoS attacks that aim to exhaust the network resources by flooding the network with a lot of fake packets and messages. There are different forms of Flooding attacks, and the most common form is the request one. Request Flooding attack keeps flooding the network with a lot of requests to the fake nodes that do not exist in the network. In this research, we presented a new enhanced AODV protocol AIF AODV that can detect and isolate flooding nodes in the network. NS-2.35 is used to simulate and to prove the efficiency of the proposed technique.The results of the enhanced protocol in terms of Throughput, End to End Delay, PDF, ARE, andNRL are very close to the native AODV without Flooding attack.The comparisons with othermodels showed that the proposed model AIF AODV has a better Throughput characteristic.
dc.publisherSecurity and Communication Networks
dc.subjectMANET
dc.subjectBlack Hole
dc.subjectAODV
dc.subjectSecurity
dc.subjectFlooding Attack
dc.titleAvoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
dc.typeArticle
Appears in Collections:Faculty & Staff Scientific Research publications

Files in This Item:
File Description SizeFormat 
8249108.pdf1.66 MBAdobe PDFThumbnail
View/Open
Show simple item record


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Admin Tools