Mitigating Blackhole and Grayhole Attack in MANET using Enhanced AODV with TLTB Mechanism
暂无分享,去创建一个
[1] Nilesh K. Modi,et al. An inquisition based Detection and Mitigating Techniques of AODV Protocol in Existence of Packet Drop Attacks , 2013 .
[2] Pankaj Sharma,et al. An Improved Watchdog Intrusion Detection Systems In Manet , 2013 .
[3] Dharma P. Agrawal,et al. Mobile Ad hoc Networking , 2002 .
[4] Behrouz A. Forouzan,et al. Data Communications and Networking , 2000 .
[5] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[6] Pankaj Sharma,et al. Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Reena Rani,et al. ON MOBILE AD HOC NETWORK , 2013 .
[9] Juan-Carlos Cano,et al. A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs , 2014, Wirel. Pers. Commun..
[10] Asis Nasipuri,et al. Mobile Ad Hoc Networks , 2004 .
[11] Satria Mandala,et al. A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .
[12] Nitin Khanna. Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography , 2016 .
[13] Nitin Khanna,et al. Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol , 2016 .
[14] Ankit D. Patel,et al. Blackhole and grayhole attacks in MANET , 2014, International Conference on Information Communication and Embedded Systems (ICICES2014).
[15] Juan-Carlos Cano,et al. Accurate detection of black holes in MANETs using collaborative bayesian watchdogs , 2012, 2012 IFIP Wireless Days.
[16] G. S. Bindra,et al. Detection and removal of co-operative blackhole and grayhole attacks in MANETs , 2012, 2012 International Conference on System Engineering and Technology (ICSET).
[17] Lein Harn,et al. Multilevel threshold secret sharing based on the Chinese Remainder Theorem , 2014, Inf. Process. Lett..
[18] P. V. G. D. Prasad Reddy,et al. Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks , 2011, Netw. Protoc. Algorithms.
[19] Raja Datta,et al. Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..
[20] Punya Peethambaran,et al. SURVEY OF MANET MISBEHAVIOUR DETECTION APPROACHES , 2014 .
[21] D. Anitha,et al. A Collaborative Selfish Replica with Watchdog and Pathrater in MANETS , 2013 .