Performance Analysis of Prevention of AODV-based Mobile AdHoc Networks under Cooperative Wormhole Attacks

[1]  Tarik Taleb,et al.  Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.

[2]  Hamid R. Sadjadpour,et al.  A unified analysis of routing protocols in MANETs , 2010, IEEE Transactions on Communications.

[3]  Rutvij H. Jhaveri,et al.  MANET Routing Protocols and Wormhole Attack against AODV , 2010 .

[4]  Prashant Krishnamurthy,et al.  DeWorm: A Simple Protocol to Detect Wormhole Attacks in Wireless Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[5]  Issa M. Khalil,et al.  LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).

[6]  Cong Hoan Vu,et al.  Collaborative Attacks on MANETs: An Analysis of Collaborative Attacks on Mobile Ad hoc Networks , 2010 .

[7]  A. S. Bhandare,et al.  Securing MANET against Co-operative Black Hole Attack and Its Performance Analysis - A Case Study , 2015, 2015 International Conference on Computing Communication Control and Automation.

[8]  S. C. Sharma,et al.  A Highly Secured Approach against Attacks in MANETS , 2010 .

[9]  F. Kamoun,et al.  MMDV: Multipath and MPR based AODV routing protocol , 2006 .

[10]  M. Natu,et al.  Analysis of wormhole intrusion attacks in MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[11]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[12]  Natarajan Meghanathan,et al.  A MANET multicast routing protocol for stable trees based on the inverse of Link Expiration Times , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).

[13]  Sun Choi,et al.  WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).

[14]  Jean Carle,et al.  Ad hoc routing protocol analysis in civil safety context , 2010, 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).