Prevention of Blackhole Attack using Certificateless Signature (CLS) Scheme in MANET
暂无分享,去创建一个
[1] Amit K. Awasthi,et al. ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2007 .
[2] John A. Clark,et al. Security Threats in Mobile Ad Hoc Networks , 2009 .
[3] Govind Sharma,et al. An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[4] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[7] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[8] P. Veeraraghavan,et al. Trust in mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[9] Rakesh Kumar,et al. An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET , 2015, SSCC.
[10] Ajit Singh,et al. A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .
[11] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[12] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[13] Jiwen Zeng,et al. Certificateless Proxy Signature from RSA , 2014 .
[14] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[15] Saadiah Yahya,et al. Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).
[16] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[17] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[18] R. Saravanan,et al. A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.
[19] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[20] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[21] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[22] Monika,et al. Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review , 2010 .
[23] Yasushi Wakahara,et al. Proposal of a method to detect black hole attack in MANET , 2009, 2009 International Symposium on Autonomous Decentralized Systems.
[24] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[25] Lalit Himral,et al. Preventing AODV Routing Protocol from Black Hole Attack , 2011 .
[26] P. N. Kumar,et al. Financial Market Analysis of Bombay Stock Exchange using an Agent Based Model , 2010 .
[27] K. Thilagam,et al. Modified AODV Protocol against Blackhole Attacks in MANET , 2010 .