A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks
暂无分享,去创建一个
Muneer O. Bani Yassein | Wail Mardini | Yaser M. Khamayseh | Abdulraheem Bader | M. B. Yassein | W. Mardini | Y. Khamayseh | Abdulraheem Bader
[1] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[2] Jon Crowcroft,et al. Proceedings of the conference on Communications architectures, protocols and applications , 1994, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication.
[3] Leonidas Georgiadis,et al. A Distributed Algorithm for Maximum Lifetime Routing in Sensor Networks with Mobile Sink , 2006, IEEE Transactions on Wireless Communications.
[4] J. J. Garcia-Luna-Aceves,et al. An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..
[5] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[6] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[7] Thomas G. Zimmerman,et al. : Near-field , 2022 .
[8] D. Kusumalatha,et al. Security Issues in Wireless Ad-Hoc Network Routing Protocols , 2013 .
[9] Dharma P. Agrawal,et al. Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[10] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[11] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[12] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[13] Ahmed Sameh,et al. Reputed Authenticated Routing Ad-Hoc Networks Protocol , 2009 .
[14] Charles E. Perkins,et al. Ad hoc networking: an introduction , 2001 .
[15] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[16] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).
[17] Ali Ghaffari,et al. Vulnerability and security of mobile ad hoc networks , 2006 .
[18] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[19] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[20] Muneer O. Bani Yassein,et al. Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks , 2013, Int. J. Mob. Comput. Multim. Commun..
[21] Ahmed Sameh,et al. Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN) , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[22] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[23] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[24] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..