A Highly Secured Approach against Attacks in MANETS
暂无分享,去创建一个
[1] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[2] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[3] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[4] Aung Htein Maw,et al. Wormhole Attack Detection in Wireless Sensor Networks , 2008 .
[5] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[6] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[7] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[8] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[10] John A. Clark,et al. Security Threats in Mobile Ad Hoc Networks , 2009 .
[11] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[12] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[13] M. Rajaram,et al. A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET , 2008 .
[14] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[15] Godwin Ansa,et al. Detection and accusation of packet forwarding misbehaviour in mobile ad-hoc networks , 2008 .
[16] Moumita Deb. A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks , 2008 .
[17] Uyen Trang Nguyen,et al. Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).
[18] David K. Y. Yau,et al. Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[19] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[20] Sugata Sanyal,et al. A distributed security scheme for ad hoc networks , 2004, CROS.