A Survey on computation of neighbouring nodes and malicious nodes in all direction with single directional antenna
暂无分享,去创建一个
[1] Robert E. Hiromoto,et al. A MAC protocol for mobile ad hoc networks using directional antennas , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[2] Ketan S. Chavda,et al. Removal of black hole attack in AODV routing protocol of MANET , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[3] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[4] Leonard Kleinrock,et al. Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals , 1984, IEEE Trans. Commun..
[5] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[6] Swaijit Kaushal,et al. A study of different types of attacks in MANET and performance analysis of AODV protocol against wormhole attack , 2015 .
[7] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[8] Nitin H. Vaidya,et al. Using directional antennas for medium access control in ad hoc networks , 2002, MobiCom '02.
[9] Jianping Pan,et al. A Distributed Directional-to-Directional MAC Protocol for Asynchronous Ad Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[10] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[11] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[12] Ram Ramanathan,et al. Ad hoc networking with directional antennas: a complete system solution , 2005, IEEE J. Sel. Areas Commun..
[13] Umang Singh,et al. Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption , 2010, IET Commun..
[14] Donald F. Towsley,et al. Neighbor discovery in wireless networks and the coupon collector's problem , 2009, MobiCom '09.