Scenario based performance analysis of reliant ad hoc on-demand distance vector routing (R-AODV) for mobile ad hoc network
暂无分享,去创建一个
S. P. Koh | Sieh Kiong Tiong | Roslan Ismail | Salman Yussof | H. S. H. Jassim | S. P. Koh | S. Tiong | Roslan Ismail | S. Yussof | H. Jassim
[1] Francisco J. Ros,et al. Enhanced access control in hybrid MANETs through utility-based pre-authentication control , 2010, CMC 2010.
[2] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[3] Nj Piscataway,et al. Wireless LAN medium access control (MAC) and physical layer (PHY) specifications , 1996 .
[4] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[5] Francis F. Martin,et al. Computer modeling and simulation , 1968 .
[6] Sachin Kumar Gupta,et al. Routing Protocols in Mobile Ad-hoc Networks \ , 2011 .
[7] D. Jhonson. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007 .
[8] S. Upadhyaya,et al. Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .
[9] Francisco J. Ros,et al. Enhanced access control in hybrid MANETs through utility-based pre-authentication control , 2010, Wirel. Commun. Mob. Comput..
[10] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[11] Clayton Campus,et al. SCHOOL OF COMPUTER SCIENCE AND SOFTWARE ENGINEERING , 1999 .
[12] Irshad Ullah,et al. Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .
[13] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[14] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[15] Giuseppe Anastasi,et al. IEEE 802.11 Ad Hoc Networks: Performance Measurements , 2003, ICDCS Workshops.
[16] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[17] George C. Hadjichristofi,et al. A framework for key management in mobile ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[18] H. Bakht. Routing protocols for mobile ad hoc networks , 2005 .
[19] Khaleel Ur Rahman Khan,et al. Performance Comparison of On-Demand and Table Driven Ad Hoc Routing Protocols Using NCTUns , 2008, Tenth International Conference on Computer Modeling and Simulation (uksim 2008).
[20] Bruce Tuch,et al. Development of WaveLAN®, an ISM band wireless LAN , 1993, AT&T Technical Journal.
[21] Voon Chin Phua,et al. Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .
[22] B.M. Ali,et al. Existing MANET routing protocols and metrics used towards the efficiency and reliability- an overview , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.
[23] Chris McDonald,et al. Reliable Routing in Ad Hoc Networks using Direct Trust Mechanisms , 2008 .
[24] Giuseppe Anastasi,et al. IEEE 802.11 AD HOC Networks: Protocols, Performance, and Open Issues , 2004 .
[25] Issa M. Khalil,et al. LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).