Route Request Flooding Attack Using Trust based Security Scheme in Manet
暂无分享,去创建一个
[1] Winston Khoon Guan Seah,et al. Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.
[2] Mehmet Gonullu,et al. Department of Computer Science and Engineering , 2011 .
[3] M. Mohana Priya. A NOVEL TECHNIQUE FOR DEFENDING ROUTING ATTACKS IN OLSR MANET , 2010 .
[4] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[5] Yu Zhang,et al. Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks , 2006, PDCAT.
[6] V. Balakrishnan,et al. Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[7] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[8] M. Pushpalatha,et al. Prevention of flooding attacks in mobile ad hoc networks , 2009, ICAC3 '09.
[9] Marjan Kuchaki Rafsanjani,et al. Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes , 2008 .
[10] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[11] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[12] Ian D. Chakeres,et al. IANA Allocations for Mobile Ad Hoc Network (MANET) Protocols , 2009, RFC.
[13] D. Jhonson. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .
[14] Virendra Pal Singh,et al. Hello Flood Attack and its Countermeasures in Wireless Sensor Networks , 2010 .
[15] Krishan Kumar,et al. Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks , 2014 .
[16] Thomas H. Clausen,et al. Representing Multi-Value Time in Mobile Ad Hoc Networks (MANETs) , 2009, RFC.
[17] Futai Zou,et al. Performance analysis of mobile ad hoc networks under flooding attacks , 2011 .
[18] M. Pushpalatha,et al. Performance Analysis of Flooding Attack Prevention Algorithm in MANETs , 2009 .