Location based analysis of AODV performance in the presence of black hole nodes
暂无分享,去创建一个
[1] Rajesh Yerneni,et al. Secure AODV protocol to mitigate Black hole attack in Mobile Ad hoc , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[2] R. Parthasarathy,et al. Performance analysis of DOA and AODV routing protocols with black hole attack in MANET , 2013, INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS - ICSSS'13.
[3] S. J. Soni,et al. Enhancing security features & performance of AODV protocol under attack for MANET , 2013, 2013 International Conference on Intelligent Systems and Signal Processing (ISSP).
[4] Jianwei Liu,et al. AODV routing protocol under several routing attacks in MANETs , 2011, 2011 IEEE 13th International Conference on Communication Technology.
[5] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[6] S. Dokurer,et al. Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.
[7] S. Sharma,et al. Detection of malicious attack in MANET a behavioral approach , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[8] Nidhi Purohit,et al. Simulation study of Black hole and Jellyfish attack on MANET using NS3 , 2011, 2011 Nirma University International Conference on Engineering.
[9] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[10] Timothy W. Finin,et al. SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[11] Mehdi Medadian,et al. Combat with Black hole attack in AODV routing protocol in MANET , 2009, 2009 First Asian Himalayas International Conference on Internet.
[12] Nik Bessis,et al. Performance Evaluation of Security Algorithms for the AODV MANET Routing Protocol , 2012, 2012 Third International Conference on Emerging Intelligent Data and Web Technologies.
[13] K. C. Shet,et al. A Trust Based Approach for AODV Protocol to Mitigate Black Hole Attack in MANET , 2012, 2012 International Conference on Computing Sciences.
[14] S. Sharma,et al. Detection and Prevention of Flooding Attack Using SVM , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[15] Farrukh Aslam Khan,et al. Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[16] R. S. Bhuvaneswaran,et al. Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.
[17] Prasenjit Choudhury,et al. A simulation analysis of flooding attack in MANET using NS-3 , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[18] N. Gandhewar,et al. Detection and Prevention of Sinkhole Attack on AODV Protocol in Mobile Adhoc Network , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.
[19] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[20] Michael P. Howarth,et al. A generalized intrusion detection & prevention mechanism for securing MANETs , 2009, 2009 International Conference on Ultra Modern Telecommunications & Workshops.
[21] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[22] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[23] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] A.A. Pirzada,et al. Secure Routing with the AODV Protocol , 2005, 2005 Asia-Pacific Conference on Communications.