Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios
暂无分享,去创建一个
[1] N. Sharma,et al. The Black-Hole Node Attack in MANET , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[2] Udo W. Pooch,et al. Detecting black-hole attack in mobile ad hoc networks , 2003 .
[3] Yibeltal Fantahun Alem,et al. Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.
[4] Kishor Jyoti Sarma,et al. A survey of Black hole attack detection in Manet , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[5] Shailender Gupta,et al. A Study of Black Hole Attack on MANET Performance , 2012 .
[6] Marjan Kuchaki Rafsanjani,et al. Black Hole Attacks Detection by Invalid Ip Addresses in Mobile Ad Hoc Networks , 2014 .
[7] Dr Pradip M. Jawandhiya. A Survey of Mobile Ad Hoc Network Attacks , 2019 .
[8] Zhou Bo,et al. A REVIEW OF ROUTING PROTOCOLS FOR MOBILE AD HOC NETWORKS , 2002 .
[9] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[10] Kurnool,et al. Prevention of Black Hole Attack in MANET , 2015 .
[11] David B. Johnson,et al. Ad-hoc On-demand Distance Vector , 2005 .
[12] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[13] Abhay Kumar Rai,et al. Different Types of Attacks on Integrated MANET-Internet Communication , 2010 .
[14] Winston Khoon Guan Seah,et al. Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..
[15] Christos Xenakis,et al. A comparative evaluation of intrusion detection architectures for mobile ad hoc networks , 2011, Comput. Secur..
[16] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.