Please use this identifier to cite or link to this item: https://idr.l1.nitk.ac.in/jspui/handle/123456789/7462
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRaju, P.R.-
dc.contributor.authorShet, K.C.-
dc.date.accessioned2020-03-30T09:59:10Z-
dc.date.available2020-03-30T09:59:10Z-
dc.date.issued2012-
dc.identifier.citationProceedings: Turing 100 - International Conference on Computing Sciences, ICCS 2012, 2012, Vol., , pp.379-383en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7462-
dc.description.abstractIn this paper, we propose a new scheme for mitigating the persistent packet reordering attack. This attack mainly makes use of the end to end congestion control mechanism of TCP. The proposed scheme uses symmetric key cryptography and modified SHA-1 (mSHA-1) hash function for verifying packet reordering. This is implemented with AOMDV routing protocol using NS-2 network simulator. The proposed solution blocks the attack after its detection. The efficiency of the proposed scheme is evaluated on different performance metrics like congestion window and TCP Good put as the attack mainly targets the congestion control mechanism of TCP. � 2012 IEEE.en_US
dc.titleA cryptographic hashing solution for mitigating persistent packet reordering attack in wireless ad hoc networksen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
7462.pdf296.14 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.