{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:54Z","timestamp":1750306314773,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,3,4]],"date-time":"2016-03-04T00:00:00Z","timestamp":1457049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,3,4]]},"DOI":"10.1145\/2905055.2905083","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Survey of Attacks and Countermeasures for Denial of Services (DoS) in Wireless Ad hoc Networks"],"prefix":"10.1145","author":[{"given":"Praveen","family":"Gupta","sequence":"first","affiliation":[{"name":"Priyatam Institute of Technology &amp; Management, Indore"}]},{"given":"Pratosh","family":"Bansal","sequence":"additional","affiliation":[{"name":"Institute of Engineering &amp; Technology, DAVV, Indore"}]}],"member":"320","published-online":{"date-parts":[[2016,3,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.904002"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2011.145"},{"key":"e_1_3_2_1_3_1","unstructured":"Annamalai A. and Yegnanarayanan V. 2012. Secured system against DDoS attack in mobile ad hoc network. In WSEAS Transactions on Communications.  Annamalai A. and Yegnanarayanan V. 2012. Secured system against DDoS attack in mobile ad hoc network. In WSEAS Transactions on Communications."},{"key":"e_1_3_2_1_4_1","unstructured":"Begum S. A. Mohan L. and Ranjitha B. 2012. Techniques for resilience of denial of service attacks in mobile ad hoc network. In Proceedings published by International Journal of Electronics Communication and Computer Engineering.  Begum S. A. Mohan L. and Ranjitha B. 2012. Techniques for resilience of denial of service attacks in mobile ad hoc network. In Proceedings published by International Journal of Electronics Communication and Computer Engineering."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Chen S. Wu J. Ye X. and Guo T. 2013. Distributed denial of service attacks detection method based on conditional random fields. In Journal of Networks 858--865.  Chen S. Wu J. Ye X. and Guo T. 2013. Distributed denial of service attacks detection method based on conditional random fields. In Journal of Networks 858--865.","DOI":"10.4304\/jnw.8.4.858-865"},{"key":"e_1_3_2_1_6_1","unstructured":"Denko M. 2005. Detection and prevention of Denial of Service (DoS) attacks in mobile ad hoc networks using reputation-based incentive scheme. In Journal of Systemics Cybernetics and Informatics 1--9.  Denko M. 2005. Detection and prevention of Denial of Service (DoS) attacks in mobile ad hoc networks using reputation-based incentive scheme. In Journal of Systemics Cybernetics and Informatics 1--9."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Dorri A. Kamel S. and R. Kheirkhah E. 2015. Security challenges in mobile ad hoc networks: a survey. In International Journal of Computer Science & Engineering Survey (IJCSES).  Dorri A. Kamel S. and R. Kheirkhah E. 2015. Security challenges in mobile ad hoc networks: a survey. In International Journal of Computer Science & Engineering Survey (IJCSES).","DOI":"10.5121\/csit.2014.41202"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2007.012832"},{"volume-title":"Proceeding of IEEE Military Communication Conference, MILCOM, 1118--1123","author":"Gupta V.","key":"e_1_3_2_1_9_1","unstructured":"Gupta , V. , Srikanth , K. , and Faloutsos , M . 2002. Denial of service attacks at the MAC layer in wireless ad hoc networks . In Proceeding of IEEE Military Communication Conference, MILCOM, 1118--1123 . Gupta, V., Srikanth, K., and Faloutsos, M. 2002. Denial of service attacks at the MAC layer in wireless ad hoc networks. In Proceeding of IEEE Military Communication Conference, MILCOM, 1118--1123."},{"volume-title":"Proceedings of IEEE 20th International Conference on Computer Communications and Networks (ICCCN), 1--6.","author":"Jia Q.","key":"e_1_3_2_1_10_1","unstructured":"Jia , Q. , Sun , K. , and Stavrou , A . 2011. CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET . In Proceedings of IEEE 20th International Conference on Computer Communications and Networks (ICCCN), 1--6. Jia, Q., Sun, K., and Stavrou, A. 2011. CapMan: Capability-based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET. In Proceedings of IEEE 20th International Conference on Computer Communications and Networks (ICCCN), 1--6."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Joshi A. Agrawal K. Arora D. and Shukla S. 2011. Efficient Content Authentication in Ad hoc Networks-Mitigating DDoS Attacks. In International Journal of Computer Applications.  Joshi A. Agrawal K. Arora D. and Shukla S. 2011. Efficient Content Authentication in Ad hoc Networks-Mitigating DDoS Attacks. In International Journal of Computer Applications.","DOI":"10.5120\/2875-3738"},{"volume-title":"Proceedings of the 35th IEEE International Convention MIPRO, 675--680","author":"Kanthe A. M.","key":"e_1_3_2_1_12_1","unstructured":"Kanthe , A. M. , Simunic , D. , and Djurek , M . 2012. Denial of service (DoS) attacks in green mobile ad-hoc networks . In Proceedings of the 35th IEEE International Convention MIPRO, 675--680 . Kanthe, A. M., Simunic, D., and Djurek, M. 2012. Denial of service (DoS) attacks in green mobile ad-hoc networks. In Proceedings of the 35th IEEE International Convention MIPRO, 675--680."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Kargar M. and Ghodsi M. 2009. Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes. In International Journal of Security and its Applications 117--128.  Kargar M. and Ghodsi M. 2009. Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes. In International Journal of Security and its Applications 117--128.","DOI":"10.1109\/CSA.2008.42"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.019"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Nadeem A. and Howarth M. P. 2013. A survey of MANET intrusion detection & prevention approaches for network layer attacks. In IEEE Communications Surveys & Tutorials 2027--2045.  Nadeem A. and Howarth M. P. 2013. A survey of MANET intrusion detection & prevention approaches for network layer attacks. In IEEE Communications Surveys & Tutorials 2027--2045.","DOI":"10.1109\/SURV.2013.030713.00201"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Pelechrinis K. Iliofotou M. and Krishnamurthy S.V. 2011. Denial of service attacks in wireless networks: The case of jammers. In IEEE Communications Surveys & Tutorials 245--257.  Pelechrinis K. Iliofotou M. and Krishnamurthy S.V. 2011. Denial of service attacks in wireless networks: The case of jammers. In IEEE Communications Surveys & Tutorials 245--257.","DOI":"10.1109\/SURV.2011.041110.00022"},{"volume-title":"1st IEEE International conference on system integration and reliability improvements, 94--103","author":"Roosta T.","key":"e_1_3_2_1_18_1","unstructured":"Roosta , T. , Shieh , S. , and Sastry , S . 2006. Taxonomy of security attacks in sensor networks and countermeasures . In 1st IEEE International conference on system integration and reliability improvements, 94--103 . Roosta, T., Shieh, S., and Sastry, S. 2006. Taxonomy of security attacks in sensor networks and countermeasures. In 1st IEEE International conference on system integration and reliability improvements, 94--103."},{"volume-title":"Proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting (PGNET'04)","author":"Razak S. A.","key":"e_1_3_2_1_19_1","unstructured":"Razak , S. A. , Furnell , S. M. , and Brooke , P. J . 2004. Attacks against mobile ad hoc networks routing protocols . In Proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting (PGNET'04) . Razak, S. A., Furnell, S. M., and Brooke, P. J. 2004. Attacks against mobile ad hoc networks routing protocols. In Proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting (PGNET'04)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Stojanovic M. Acimovic-Raspopovic V. and Timcenko V. 2012. The impact of mobility patterns on MANET vulnerability to DDoS attacks. In Research Journal of Electronics and Electrical Engineering 29--34.  Stojanovic M. Acimovic-Raspopovic V. and Timcenko V. 2012. The impact of mobility patterns on MANET vulnerability to DDoS attacks. In Research Journal of Electronics and Electrical Engineering 29--34.","DOI":"10.5755\/j01.eee.119.3.1358"},{"volume-title":"IEEE Military Communications Conference, MILCOM, 1--7.","author":"Xing F.","key":"e_1_3_2_1_21_1","unstructured":"Xing , F. , and Wang , W . 2006. Understanding dynamic denial of service attacks in mobile ad hoc networks . In IEEE Military Communications Conference, MILCOM, 1--7. Xing, F., and Wang, W. 2006. Understanding dynamic denial of service attacks in mobile ad hoc networks. In IEEE Military Communications Conference, MILCOM, 1--7."},{"key":"e_1_3_2_1_22_1","unstructured":"Yau P. Hu S. and Mitchell C. J. 2009. Malicious attacks on ad hoc network routing protocols. In International Journal of Computer Research.  Yau P. Hu S. and Mitchell C. J. 2009. Malicious attacks on ad hoc network routing protocols. In International Journal of Computer Research."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2004.1269716"},{"key":"e_1_3_2_1_24_1","unstructured":"http:\/\/www.ddosattacks.net\/  http:\/\/www.ddosattacks.net\/"},{"key":"e_1_3_2_1_25_1","unstructured":"http:\/\/www.digitalattackmap.com\/  http:\/\/www.digitalattackmap.com\/"},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/www.dos-mitigation.com\/  http:\/\/www.dos-mitigation.com\/"}],"event":{"name":"ICTCS '16: Second International Conference on Information and Communication Technology for Competitive Strategies","acronym":"ICTCS '16","location":"Udaipur India"},"container-title":["Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905083","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2905055.2905083","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:02Z","timestamp":1750222442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2905055.2905083"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,4]]},"references-count":26,"alternative-id":["10.1145\/2905055.2905083","10.1145\/2905055"],"URL":"https:\/\/doi.org\/10.1145\/2905055.2905083","relation":{},"subject":[],"published":{"date-parts":[[2016,3,4]]},"assertion":[{"value":"2016-03-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}