Survey on Mobile Ad Hoc Network Attacks and Mitigation Using Routing Protocols
暂无分享,去创建一个
[1] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[2] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[3] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[5] A. Tamilarasi,et al. An Improved Location aided Cluster Based Routing Protocol with Intrusion Detection System in Mobile Ad Hoc Networks , 2011 .
[6] Giovanni Vigna,et al. An intrusion detection tool for AODV-based ad hoc wireless networks , 2004, 20th Annual Computer Security Applications Conference.
[7] V. Madhu Viswanatham,et al. An Approach for Detecting Attacks in Mobile Adhoc Networks , 2008 .
[8] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[9] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[10] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[11] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[12] Rajendra V. Boppana,et al. On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[13] N. Bhalaji,et al. A Novel Routing Technique against Packet Dropping Attack in Adhoc Networks , 2008 .
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[16] Aikaterini Mitrokotsa,et al. DDoS attacks and defense mechanisms: classification and state-of-the-art , 2004, Comput. Networks.
[17] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[18] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).