alexa Abstract | Cache Consistency and IDS for Handling Attacks in Routing Ad-hoc networks
ISSN ONLINE(2320-9801) PRINT (2320-9798)

International Journal of Innovative Research in Computer and Communication Engineering
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article Open Access


Ad-hoc networks are composed of autonomous nodes that are self-managed without any infrastructure. Due to their dynamic topology, wireless Ad-hoc networks are vulnerable to Denial of Service (DoS) attacks—an instance of a resource depletion attack, with battery power as the resource of interestw. This type of attack is termed as “Vampire” attacks. Such attacks are encountered in two phases: Topology Discovery and Packet forwarding phase where a cache consistency scheme is proposed. In the topology discovery phase, nodes are discovered by the neighbors by building a tree of Neighbor relationship and Grouping membership used for addressing and routing. The PLGP (Parno, Luk, Gaustad, and Perrig) routing protocol which is responsible to perform the no-backtracking property is enhanced with the Ad-hoc routing protocols such as DSR (Dynamic Source Routing) and AODV (Ad-hoc On- demand Distance Vector) such that it ensures malicious node prevention during the packet forwarding phase. The topology is discovered along with the attack description by means of Intrusion Detection Scheme such that attacker has minimum possibilities to get involved in the succeeding packet forwarding phase. However, the PLGP with attestation of a history table is enhanced with Ad-hoc routing protocols depending upon the attack identified in the previous phase. Finally, a performance evaluation statistics is compared with the existing results.

To read the full article Peer-reviewed Article PDF image | Peer-reviewed Full Article image

Author(s): P.Preethi Monolin, Dr.J. Amutharaj

Share This Page

Additional Info

Loading Please wait..
Peer Reviewed Journals
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version