Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data
暂无分享,去创建一个
[1] S. S. Tyagi. Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .
[2] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[3] A. Khatkar,et al. Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
[4] M. Prasannakumar.,et al. Classification of Ad Hoc Routing Protocols , 2018 .
[5] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[6] Pallavi Sharma,et al. An approach to defend against wormhole attack in ad hoc network using digital signature , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[7] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Honglong Chen,et al. Secure localization against wormhole attacks using conflicting sets , 2010, International Performance Computing and Communications Conference.
[9] Michalis Faloutsos,et al. TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[10] Magdy S. El-Soudani,et al. An innovative approach for the wormhole attack detection and prevention in wireless ad hoc networks , 2010, 2010 International Conference on Networking, Sensing and Control (ICNSC).
[11] Jong-Wook Jang,et al. Result Based on NS2, Simulation and Emulation Verification , 2009, 2009 International Conference on New Trends in Information and Service Science.
[12] Siddlingappagouda Biradar,et al. Performance Analysis of AODV Routing Protocol Under Flooding Attack in Manet’s Using NS2 , 2015 .
[13] Mohamed Hashem,et al. Securing DSR with mobile agents in wireless ad hoc networks , 2011 .
[14] S. J. Soni,et al. Enhancing security features & performance of AODV protocol under attack for MANET , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).
[15] D. Sreenivasa Rao,et al. A Simple Algorithm for Detection and Removal of Wormhole Attacks for Secure Routing In Ad Hoc Wireless Networks , 2011 .
[16] Radha Poovendran,et al. Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[17] Yunhao Liu,et al. Topological detection on wormholes in wireless ad hoc and sensor networks , 2009, IEEE/ACM Transactions on Networking.
[18] David Evans,et al. Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.
[19] Yunhao Liu,et al. WormCircle: Connectivity-Based Wormhole Detection in Wireless Ad Hoc and Sensor Networks , 2009, 2009 15th International Conference on Parallel and Distributed Systems.
[20] Daniel Mahrenholz,et al. Adjusting the ns-2 Emulation Mode to a Live Network , 2005, KiVS.
[21] Durgesh Kumar Mishra,et al. Security issues in MANET: A review , 2010, 2010 Seventh International Conference on Wireless and Optical Communications Networks - (WOCN).
[22] Saurabh Bagchi,et al. MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.
[23] Yi Mu,et al. Securing DSR against wormhole attacks in multirate ad hoc networks , 2013, J. Netw. Comput. Appl..