Security attacks and detection schemes in MANET
暂无分享,去创建一个
[1] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[4] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[5] Winston Khoon Guan Seah,et al. Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..
[6] Xue Liu,et al. Research on multicast routing protocols for mobile ad-hoc networks , 2008, Comput. Networks.
[7] Nei Kato,et al. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[8] Madjid Merabti,et al. Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.
[9] Xizhao Wang,et al. Covariance-Matrix Modeling and Detecting Various Flooding Attacks , 2007, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[10] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[11] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[12] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[13] Baban A. Mahmood. Routing and Security in Mobile Ad Hoc Networks , 2016 .
[14] M. Phil.. A Survey of Routing Attacks in Manet , 2015 .
[15] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[16] Ruoyu Wu,et al. Risk-Aware Mitigation for MANET Routing Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[17] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[18] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[19] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[20] Tadeusz A. Wysocki,et al. Scalability of MANET routing protocols for heterogeneous and homogenous networks , 2010, Comput. Electr. Eng..
[21] K. Selvakumar,et al. Eaack- A Secure Intrusion Detection System for Manets , 2015 .
[22] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[23] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[24] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[25] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[26] David K. Y. Yau,et al. Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.