Study of Attacks in MANET, Attacks on AES, Cryptographically Generated Addresses (CGAs) Methods and Possible Alleviation in IPV6 over MANET Area
暂无分享,去创建一个
[1] Antonio F. Gómez-Skarmeta,et al. Security Extensions to MMARP Through Cryptographically Generated Addresses , 2005, GI Jahrestagung.
[2] Christoph Meinel,et al. Cryptographically Generated Addresses (CGAs): Possible Attacks and Proposed Mitigation Approaches , 2012, 2012 IEEE 12th International Conference on Computer and Information Technology.
[3] M. U. Siddiqi,et al. Collision probability of one-to-many reversible mapping for IPv6 address generation , 2012, 2012 International Conference on Computer and Communication Engineering (ICCCE).
[4] Mohammad Umar Siddiqi,et al. Simulation Study of a Many-to-One Mapping for IPv6 Address Owner Identification in an Enterprise Local Area Network , 2015, Int. J. Netw. Secur..
[5] Neeraj Sharma,et al. ATTACK PREVENTION METHODS FOR DDOS ATTACKS IN MANETS , 2011 .
[6] Mukesh Zaveri,et al. Improving AODV Protocol against Blackhole Attacks , 2010 .
[7] Warren D. Smith. 1. AES seems weak. 2. Linear time secure cryptography , 2007, IACR Cryptol. ePrint Arch..
[8] T. Thumthawatworn,et al. Adaptive sinkhole detection on wireless ad hoc networks , 2006, 2006 IEEE Aerospace Conference.
[9] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[10] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[11] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[12] George Kesidis,et al. Robust Sybil Detection for MANETs , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.
[13] Yu Cheng,et al. Channel-Aware Detection of Gray Hole Attacks in Wireless Mesh Networks , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[14] S.A. Khan,et al. Adding Security against Packet Dropping Attack in Mobile Ad Hoc Networks , 2008, 2008 International Seminar on Future Information Technology and Management Engineering.
[15] Jari Arkko. Applying Cryptographically Generated Addresses and Credit-Based Authorization to Mobile IPv6 , 2006 .
[16] S. Radha,et al. A Novel Method for Detection and Elimination of Modification Attack and TTL Attack in NTP Based Routing Algorithm , 2010, 2010 International Conference on Recent Trends in Information, Telecommunication and Computing.
[17] Girish Katkar,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[18] Yih-Chun Hu,et al. Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[19] Daniel J. Bernstein,et al. Cache-timing attacks on AES , 2005 .
[20] Adolfo Rodriguez,et al. TCP/IP Tutorial and Technical Overview , 2001 .
[21] Tarek N. Saadawi,et al. IEEE 802.11 Denial of Service attack detection in MANET , 2012, Wireless Telecommunications Symposium 2012.
[22] Edward W. Knightly,et al. Denial of service resilience in ad hoc networks , 2004, MobiCom '04.
[23] Shiyong Zhang,et al. Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[24] Md. Shamsul Alam,et al. Security in Ad Hoc Networks: A Location Based Impersonation Detection Method , 2009, 2009 International Conference on Computer Engineering and Technology.
[25] Eamon Murphy,et al. Tcp/Ip Tutorial and Technical Overview , 1995 .
[26] M. U. Siddiqi,et al. Generation of cryptographic one-to-many mapping IPv6 address using S-AES , 2010, Proceeding of the 3rd International Conference on Information and Communication Technology for the Moslem World (ICT4M) 2010.
[27] Muthucumaru Maheswaran,et al. A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[28] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[29] Öznur Özkasap,et al. Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.
[30] Jalel Ben-Othman,et al. Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution , 2009, 2009 IEEE International Conference on Communications.
[31] P. V. G. D. Prasad Reddy,et al. Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks , 2011, Netw. Protoc. Algorithms.
[32] Aseem Jagadev,et al. Advanced Encryption Standard (AES) Implementation , 2009 .
[33] Michael Roe,et al. Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.
[34] Shaaban Sahmoud,et al. Enhancement the Security of AES Against Modern Attacks by Using Variable Key Block Cipher , 2013, Int. Arab. J. e Technol..