Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[2] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[3] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.
[4] Reena Rani,et al. ON MOBILE AD HOC NETWORK , 2013 .
[5] Ilango Krishnamurthi,et al. Enhanced OLSR for defense against DOS attack in ad hoc networks , 2013, Journal of Communications and Networks.
[6] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[7] Daniele Rao,et al. Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .
[8] Securing the OLSR protocol , 2003 .
[9] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[10] Rafael Timóteo de Sousa Júnior,et al. Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..
[11] Nei Kato,et al. Analysis of the node isolation attack against OLSR-based mobile ad hoc networks , 2006, 2006 International Symposium on Computer Networks.
[12] Nei Kato,et al. NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.
[13] Rafael Timóteo de Sousa Júnior,et al. Trust-Based Countermeasures for Securing OLSR Protocol , 2009, 2009 International Conference on Computational Science and Engineering.
[14] Tae-Hyung Kim,et al. LT-OLSR: Attack-tolerant OLSR against link spoofing , 2012, 37th Annual IEEE Conference on Local Computer Networks.
[15] Michael P. Howarth,et al. An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.
[16] C. Adjih,et al. Attacks Against OLSR : Distributed Key Management for Security , 2022 .
[17] Paul Mühlethaler,et al. An advanced signature system for OLSR , 2004, SASN '04.
[18] Vijay Laxmi,et al. Collusion attack resistance through forced MPR switching in OLSR , 2010, 2010 IFIP Wireless Days.
[19] Philippe Jacquet,et al. Optimized Link State Routing Protocol (OLSR) , 2003, RFC.
[20] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[21] Liang Hong,et al. Secure OLSR , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[22] A. Laouiti,et al. Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..
[23] Peter Martini,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[24] Danny Dhillon,et al. Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs , 2006, IWCMC '06.
[25] Danny Dhillon,et al. Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[26] Sondre Wabakken Engell. Securing the OLSR Protocol , 2004 .
[27] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[28] M. A. Rizvi,et al. Security for node isolation attack on OLSR by modifying MPR selection process , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).
[29] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[30] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[31] S. Muknahallipatna,et al. Fibre Channel Switch Modeling at Fibre Channel-2 Level for Large Fabric Storage Area Network Simulations using OMNeT++ , 2007 .
[32] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[33] M. Wang,et al. An effective intrusion detection approach for OLSR MANET protocol , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..
[34] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[35] Michael P. Howarth,et al. Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..