A Robust Approach to Detect and Prevent Network Layer Attacks in MANETS
暂无分享,去创建一个
[1] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[2] malcolm. parsons. Performance Evaluation of the Impact of Attacks on Mobile Ad hoc Networks , 1968 .
[3] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Amitabh Mishra,et al. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.
[5] M. Rajaram,et al. A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET , 2008 .
[6] Chu-Hsing Lin,et al. Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[7] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[8] Stefan Schlott,et al. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks , 2004, ESAS.
[9] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[10] Godwin Ansa,et al. Detection and accusation of packet forwarding misbehaviour in mobile ad-hoc networks , 2008 .
[11] Satria Mandala,et al. A survey on MANET intrusion detection , 2008 .
[12] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[13] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[14] Yue Wu,et al. Malicious node detection in ad hoc networks using timed automata , 2007 .
[15] Yu Zhang,et al. Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.
[16] Lijun Qian,et al. Wormhole attacks detection in wireless ad hoc networks: a statistical analysis approach , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[17] Satria Mandala,et al. A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .
[18] Moumita Deb. A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks , 2008 .