A neighborhood connectivity-based trust scheme to identify active black hole attacks
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[2] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[3] Djamel Djenouri,et al. Convergence analysis of distributed fixed-step power control algorithm for cellular mobile systems , 2008 .
[4] Amitava Datta,et al. Performance comparison of trust-based reactive routing protocols , 2006, IEEE Transactions on Mobile Computing.
[5] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[6] Isaac Woungang,et al. Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks , 2012, FPS.
[7] William Kozma,et al. REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits , 2009, WiSec '09.
[8] Daniel R. Simon,et al. Secure traceroute to detect faulty or malicious routing , 2003, CCRV.
[9] K. J. Ray Liu,et al. HADOF: defense against routing disruptions in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[10] Ning Liu,et al. The Simulation and Comparison of Routing Attacks on DSR Protocol , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[12] Ming Gu,et al. Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.