Vulnerabilities, Challenges and Threats in Securing Mobile Ad-Hoc Network
暂无分享,去创建一个
[1] M. K. Verma,et al. A survey on: An analysis of secure routing of volatile nodes in MANET , 2012, 2012 CSI Sixth International Conference on Software Engineering (CONSEG).
[2] S. S. Tyagi. Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .
[3] S. Nandgave-Usturge. Study of congestion control using AODV and signal strength by avoiding link failure in MANET , 2012, 2012 International Conference on Communication, Information & Computing Technology (ICCICT).
[4] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[5] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[6] Razali,et al. Comparative review study of reactive and proactive routing protocols in MANETs , 2010 .
[7] Nishu Garg,et al. MANET Security Issues , 2009 .
[8] Neha Khandelwal,et al. An Overview Of security Problems in MANET , 2011 .
[9] P. Goyal,et al. MANET: Vulnerabilities, Challenges, Attacks, Application , 2011 .
[10] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[11] Monis Akhlaq,et al. Addressing Security Concerns of Data Exchange in AODV Protocol , 2008 .
[12] D. K. Mishra. Tutorial: Privacy Preservation in MANET: Issues and Challenges , 2012, 2012 Third International Conference on Intelligent Systems Modelling and Simulation.
[13] G. V. Kumar,et al. Current Research Work on Routing Protocols for MANET: A Literature Survey , 2010 .
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] V. S. Sheeba,et al. Security in Mobile Ad-Hoc Networks , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).