An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[2] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[3] Mehdi Medadian,et al. Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.
[4] A. Pushpa. Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[5] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[6] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[7] Yibeltal Fantahun Alem,et al. Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.
[8] Ashish Jain,et al. Secure Routing in Mobile Ad hoc Network , 2010 .
[9] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[10] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..
[11] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[12] J. J. Garcia-Luna-Aceves,et al. An efficient routing protocol for wireless networks , 1996, Mob. Networks Appl..
[13] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[14] Mario Joa-Ng,et al. A peer-to-peer zone-based two-level link state routing for mobile ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[15] Chai-Keong Toh,et al. Associativity-Based Routing for Ad Hoc Mobile Networks , 1997, Wirel. Pers. Commun..
[16] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[17] R.A. Raja Mahmood,et al. A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.
[18] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[19] Davide Cerri,et al. Securing AODV: the A-SAODV secure routing prototype , 2008, IEEE Communications Magazine.
[20] C C. Chiang,et al. Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel , 1997 .
[21] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[22] Dharma P. Agrawal,et al. Strategies for enhancing routing security in protocols for mobile ad hoc networks , 2003, J. Parallel Distributed Comput..
[23] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .