—The mobile ad hoc networks are highly vulnerable to attacks because of its unique characteristics such as: open network architecture, shared wireless medium, and stringent resource constraints. These attacks can potentially degrade the network performance by constantly transmitting packets and keeping the ad hoc network busy. This paper presents the review and the comparison between existing variants of TCP protocols, such as TCP Tahoe, TCP Reno, New Reno, SACK TCP and TCP Vegas with regard to their security implications. A properly-designed and implemented security measures can significantly reduce the load that the malware places on the mobile Ad-Hoc Networks.
—Ad hoc networks, congestion control, security protocols, TCP protocols.br />
Heshem A. El Zouka is with the Department of Computer Engineering, College of Engineering and Technology, Arab Academy for Science and Technology and Maritime Transport, Alexandria, Egypt (e-mail: firstname.lastname@example.org).
Cite: Heshem A. El Zouka, "Analysis of Denial of Service Attacks on Mobile Ad-Hoc Networks," International Journal of Engineering and Technology vol. 9, no. 1, pp. 12-16, 2017.