Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks
暂无分享,去创建一个
Asaf Shabtai | Nadav Schweitzer | Ariel Stulman | Roy David Margalit | A. Shabtai | R. Margalit | Ariel Stulman | Nadav Schweitzer
[1] Jérôme Haerri,et al. Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns , 2006 .
[2] G. S. Bindra,et al. Detection and removal of co-operative blackhole and grayhole attacks in MANETs , 2012, 2012 International Conference on System Engineering and Technology (ICSET).
[3] M. Karthikeyan,et al. Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..
[4] Anis Laouiti,et al. Quantitative Evaluation of the Cost of Routing Protocol OLSR in a Vehicle Ad Hoc NETwork (VANET) , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.
[5] C. Adjih,et al. Attacks Against OLSR : Distributed Key Management for Security , 2022 .
[6] Antonio F. Gómez-Skarmeta,et al. Assessment of VANET multi-hop routing over an experimental platform , 2009, Int. J. Internet Protoc. Technol..
[7] Roksana Boreli,et al. Trusted routing for VANET , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).
[8] Sukla Banerjee. Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .
[9] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[10] Daniele Rao,et al. Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .
[11] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[12] Nei Kato,et al. NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.
[13] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[14] S. Muknahallipatna,et al. Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .
[15] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[16] P. Jacquet,et al. Securing the OLSR protocol , 2003 .
[17] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[18] Sondre Wabakken Engell. Securing the OLSR Protocol , 2004 .
[19] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[20] K. J. Ray Liu,et al. HADOF: defense against routing disruptions in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[21] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[22] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[23] Enrique Alba,et al. Intelligent OLSR Routing Protocol Optimization for VANETs , 2012, IEEE Transactions on Vehicular Technology.
[24] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[25] Rutvij H. Jhaveri,et al. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.
[26] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[27] Ilango Krishnamurthi,et al. Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..
[28] Soufiene Djahel,et al. An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol , 2008, 2008 IEEE International Conference on Communications.
[29] Paul Mühlethaler,et al. An advanced signature system for OLSR , 2004, SASN '04.
[30] Asaf Shabtai,et al. Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.
[31] Majid Iqbal Khan,et al. A Comparative Performance Analysis of MANET Routing Protocols under Security Attacks , 2015 .
[32] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[33] Ankit D. Patel,et al. Dual Security Against Grayhole Attack in MANETs , 2015 .