A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks 


Vol. 37,  No. 9, pp. 772-779, Sep.  2012


PDF
  Abstract

In the current MANET, DOS or DDOS attacks are increasing, but as MANET has limited bandwidth, computational resources and battery power, the existing traceback mechanisms can not be applied to it. Therefore, in case of traceback techniques being applied to MANET, the resource of each node must be used efficiently. However, in the traceback techniques applied to an existing ad hoc network, as a cluster head which represents all nodes in the cluster area manages the traceback, the overhead of the cluster head shortens each node"s life. In addition, in case of multi-hop clustering, as one Cluster head manages more node than one, its problem is getting even worse. This paper proposes TNA(Traceback against Network Attacks) based on multihop clustering using the depth of tree structure in order to reduce the overhead of distributed information management.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

J. Kim and B. Lee, "A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 9, pp. 772-779, 2012. DOI: .

[ACM Style]

Ju-Yung Kim and Byung-Kwan Lee. 2012. A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks. The Journal of Korean Institute of Communications and Information Sciences, 37, 9, (2012), 772-779. DOI: .

[KICS Style]

Ju-Yung Kim and Byung-Kwan Lee, "A Design of TNA(Traceback against Network Attacks) Based on Multihop Clustering using the depth of Tree structure on Ad-hoc Networks," The Journal of Korean Institute of Communications and Information Sciences, vol. 37, no. 9, pp. 772-779, 9. 2012.