Prevention of Blackhole Attack using Certificateless Signature (CLS) Scheme in MANET

[1]  Amit K. Awasthi,et al.  ID-based Ring Signature and Proxy Ring Signature Schemes from Bilinear Pairings , 2007 .

[2]  John A. Clark,et al.  Security Threats in Mobile Ad Hoc Networks , 2009 .

[3]  Govind Sharma,et al.  An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Manel Guerrero Zapata Secure ad hoc on-demand distance vector routing , 2002, MOCO.

[5]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[6]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[7]  Nei Kato,et al.  A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.

[8]  P. Veeraraghavan,et al.  Trust in mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.

[9]  Rakesh Kumar,et al.  An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET , 2015, SSCC.

[10]  Ajit Singh,et al.  A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .

[11]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[12]  V. Sankaranarayanan,et al.  Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.

[13]  Jiwen Zeng,et al.  Certificateless Proxy Signature from RSA , 2014 .

[14]  Michael P. Howarth,et al.  A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.

[15]  Saadiah Yahya,et al.  Analysis of Wormhole attack on MANETs using different MANET routing protocols , 2012, 2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN).

[16]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[17]  Mihaela Cardei,et al.  A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .

[18]  R. Saravanan,et al.  A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.

[19]  Prashant B. Swadas,et al.  Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.

[20]  Li-Der Chou,et al.  A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.

[21]  P. Goyal,et al.  MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .

[22]  Monika,et al.  Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review , 2010 .

[23]  Yasushi Wakahara,et al.  Proposal of a method to detect black hole attack in MANET , 2009, 2009 International Symposium on Autonomous Decentralized Systems.

[24]  Nei Kato,et al.  Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..

[25]  Lalit Himral,et al.  Preventing AODV Routing Protocol from Black Hole Attack , 2011 .

[26]  P. N. Kumar,et al.  Financial Market Analysis of Bombay Stock Exchange using an Agent Based Model , 2010 .

[27]  K. Thilagam,et al.  Modified AODV Protocol against Blackhole Attacks in MANET , 2010 .