Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/56599
Full metadata record
DC FieldValueLanguage
dc.contributor.authorVaradharajan, Vijayen
dc.contributor.authorTupakula, Udayaen
dc.date.accessioned2023-11-15T08:24:23Z-
dc.date.available2023-11-15T08:24:23Z-
dc.date.issued2015-
dc.identifier.citationConcurrency and Computation: Practice and Experience, 27(15), p. 3794-3815en
dc.identifier.issn1532-0634en
dc.identifier.issn1532-0626en
dc.identifier.urihttps://hdl.handle.net/1959.11/56599-
dc.description.abstract<p>The current mobile devices have become smart and are increasingly being used for conducting business and personal activities. Also, there is increasing number of attacks targeting such mobile devices. The term mobile botnet refers to group of mobile devices that are compromised and controlled by the attacker that can be used for generating distributed denial-of-service attacks. The security protocols that have been proposed for wireless and mobile networks have several weaknesses that can be exploited by the attacker to obtain unauthorized access and generate attacks. Also, there is growing number of malicious applications that are aimed to compromise smartphones and using them for generating different types of attacks. In this paper, we propose techniques to counteract distributed denial-of-service attacks on wireless mobile devices. We describe the operation and architectural components of our model. We will show that our model is able to efficiently deal with the attacks by dropping the attack traffic before it targets the victim mobile node, can prevent the attack traffic at the upstream nodes, and also deal with the attack cases that involve mobility of the attacking and victim nodes.</p>en
dc.languageenen
dc.publisherJohn Wiley & Sons Ltd.en
dc.relation.ispartofConcurrency and Computation: Practice and Experienceen
dc.titleSecuring wireless mobile nodes from distributed denial-of-service attacksen
dc.typeJournal Articleen
dc.identifier.doi10.1002/cpe.3353en
local.contributor.firstnameVijayen
local.contributor.firstnameUdayaen
local.profile.schoolSchool of Science & Technologyen
local.profile.emailutupakul@une.edu.auen
local.output.categoryC1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeUnited Kingdomen
local.format.startpage3794en
local.format.endpage3815en
local.peerreviewedYesen
local.identifier.volume27en
local.identifier.issue15en
local.contributor.lastnameVaradharajanen
local.contributor.lastnameTupakulaen
dc.identifier.staffune-id:utupakulen
local.profile.orcid0000-0001-5048-9797en
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/56599en
local.date.onlineversion2014-08-29-
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitleSecuring wireless mobile nodes from distributed denial-of-service attacksen
local.output.categorydescriptionC1 Refereed Article in a Scholarly Journalen
local.search.authorVaradharajan, Vijayen
local.search.authorTupakula, Udayaen
local.open.fileurlhttps://rune.une.edu.au/web/retrieve/a079f85d-d2b7-471c-9250-d45711107eacen
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.available2014en
local.year.published2015en
local.fileurl.openhttps://rune.une.edu.au/web/retrieve/a079f85d-d2b7-471c-9250-d45711107eacen
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/a079f85d-d2b7-471c-9250-d45711107eacen
local.subject.for2020460407 System and network securityen
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.date.moved2024-04-16en
Appears in Collections:Journal Article
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

SCOPUSTM   
Citations

2
checked on Feb 15, 2025
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.