Quantifying the Severity of Blackhole Attack in Wireless Mobile Adhoc Networks
暂无分享,去创建一个
[1] Xiaodong Lin,et al. A clique-based secure admission control scheme for mobile ad hoc networks (MANETs) , 2011, J. Netw. Comput. Appl..
[2] Udo W. Pooch,et al. Detecting black-hole attack in mobile ad hoc networks , 2003 .
[3] Dhinaharan Nagamalai,et al. Recent Trends in Wireless and Mobile Networks , 2011 .
[4] Robbert van Renesse,et al. JiST: an efficient approach to simulation using virtual machines , 2005, Softw. Pract. Exp..
[5] Michele Garetto,et al. Analysis of Random Mobility Models with Partial Differential Equations , 2007, IEEE Transactions on Mobile Computing.
[6] Adrian Perrig,et al. Proceedings of the 2nd ACM workshop on Wireless security , 2003 .
[7] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[8] Robbert van Renesse,et al. JiST: an efficient approach to simulation using virtual machines: Research Articles , 2005 .
[9] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[10] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[11] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[12] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[13] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[14] Younghwan Yoo,et al. Why does it pay to be selfish in a MANET? , 2006, IEEE Wireless Communications.
[15] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[16] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[17] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[18] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[19] Abdul Hanan Abdullah,et al. A Variant of Merkle Signature Scheme to Protect AODV Routing Protocol , 2010, WiMo.
[20] J. J. Garcia-Luna-Aceves,et al. Non-interactive key establishment in mobile ad hoc networks , 2007, Ad Hoc Networks.
[21] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[22] Jane Zhen,et al. Preventing Replay Attacks for Secure Routing in Ad Hoc Networks , 2003, ADHOC-NOW.
[23] S.S. Ramaswami,et al. Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing , 2006, 2006 IEEE Information Assurance Workshop.
[24] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[25] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[26] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).