Performance Analysis of Malicious Node Detection and Elimination Using Clustering Approach on MANET
暂无分享,去创建一个
[1] K Vishnu,et al. Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks , 2010 .
[2] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[3] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[4] Ademola P. Abidoye,et al. ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks , 2011, Wirel. Sens. Netw..
[5] Vidya Kadam,et al. An Acknowledgement-Based Approach for the Detection of Routing Misbehaviour in MANETS , 2011 .
[6] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[7] C. Vasanthanayaki,et al. Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks , 2015, IEEE Sensors Journal.
[8] S. Deng,et al. Mobility-based clustering protocol for wireless sensor networks with mobile nodes , 2011, IET Wirel. Sens. Syst..
[9] Abderrahmane Baadache,et al. Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.
[10] G. H. Raisoni,et al. A Survey on Intrusion in Ad Hoc Networks and its Detection Measures , 2011 .
[11] Abraham O. Fapojuwo,et al. A centralized energy-efficient routing protocol for wireless sensor networks , 2005, IEEE Communications Magazine.
[12] B. S. Ramanjaneyulu,et al. Optimized Energy Efficient Routing Protocol for life-time improvement in Wireless Sensor Networks , 2012, IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012).
[13] M. R. Tripathy,et al. Routing Protocols in Wireless Sensor Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[14] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[15] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[16] Klara Nahrstedt,et al. Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments , 2004, Wirel. Pers. Commun..