Defending MANETs against flooding attacks for military applications under group mobility
暂无分享,去创建一个
[1] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[2] Chai-Keong Toh,et al. Ad hoc mobile wireless networks : protocols and systems , 2002 .
[3] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[4] Karim Konate,et al. Attacks Analysis in Mobile Ad Hoc Networks: Modeling and Simulation , 2011, 2011 Second International Conference on Intelligent Systems, Modelling and Simulation.
[5] William Stallings,et al. Network Security Essentials: Applications and Standards , 1999 .
[6] R. Ruppe,et al. Near Term Digital Radio (NTDR) system , 1997, MILCOM 97 MILCOM 97 Proceedings.
[7] Wenke Lee,et al. Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.
[8] Mun Choon Chan,et al. On the effectiveness of DDoS attacks on statistical filtering , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[9] W.K.G. Seah,et al. Framework for statistical filtering against DDoS attacks in MANETs , 2005, Second International Conference on Embedded Software and Systems (ICESS'05).
[10] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[11] Sylvie Perreau,et al. A Flow Based Detection Mechanism against Flooding Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE Wireless Communications and Networking Conference.
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[13] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[14] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[15] Rajendra V. Boppana,et al. Mitigating malicious control packet floods in ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[16] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.
[17] Shiyong Zhang,et al. Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[18] Prasenjit Choudhury,et al. A simulation analysis of flooding attack in MANET using NS-3 , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[19] Liu Ai-fang,et al. A new AODV based clustering routing protocol , 2005, Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005..
[20] Narayan C. Debnath,et al. Mitigating route request flooding attack in MANET using node reputation , 2012, IEEE 10th International Conference on Industrial Informatics.
[21] Yinghua Guo,et al. Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS Attacks , 2010, 2010 Fourth International Conference on Network and System Security.
[22] V. Balakrishnan,et al. Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[23] Winston Khoon Guan Seah,et al. Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.
[24] J.B.D. Cabrera,et al. Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.
[25] V. Rhymend Uthariaraj,et al. Prevention of denial of service attacks and performance enhancement in Mobile Adhoc networks , 2009, COMSNETS 2009.
[26] V. Rhymend Uthariaraj,et al. Prevention of Denial of Service Attacks and Performance Enhancement in Mobile Ad hoc Networks , 2009, 2009 Sixth International Conference on Information Technology: New Generations.
[27] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[28] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[29] William Stallings Zhu,et al. Network Security Essentials : Applications and Standards , 2007 .