Literature review of routing attacks in MANET
暂无分享,去创建一个
[1] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[2] S C Sharma,et al. Analytical Study of Broadcast in Mobile Adhoc Network , 2011 .
[3] Pascal Lorenz,et al. Performance analysis of optimized trust AODV using ant algorithm , 2014, 2014 IEEE International Conference on Communications (ICC).
[4] B EndSemesterMcs. WIRELESS AND MOBILE NETWORKS , 2011 .
[5] A. Khatkar,et al. Wormhole Attack Avoidance Technique in Mobile Adhoc Networks , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
[6] Badr Benmammar,et al. Wireless and Mobile Networks , 2013 .
[7] Subrat Kar,et al. BAAP: Blackhole attack avoidance protocol for wireless network , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).
[8] Vimal Kumar,et al. An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network , 2015 .
[9] Savita Gandhi,et al. Effect of pause time on AODV and TSDRP routing protocols under black hole attack and DoS attacks in MANETs , 2015, 2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom).
[10] Mamta patel,et al. Sinkhole Attack Detection Based on Redundancy Mechanism in Wireless Sensor Network , 2016 .
[11] Lidong Zhai,et al. Sinkhole Attack Detection based on Redundancy Mechanism in Wireless Sensor Networks , 2014, ITQM.
[12] I. Woungang,et al. Detecting blackhole attacks on DSR-based mobile ad hoc networks , 2012, 2012 International Conference on Computer, Information and Telecommunication Systems (CITS).
[13] S. C. Sharma. Routing Load Analysis of Broadcast based Reactive Routing Protocols AODV, DSR and DYMO for MANET , 2011 .
[14] Abdul Hanan Abdullah,et al. A review of blackhole attack in mobile adhoc network , 2013, 2013 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI-BME).
[15] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[16] Chaitali Biswas Dutta,et al. A novel blackhole attack for multipath AODV and its mitigation , 2014, International Conference on Recent Advances and Innovations in Engineering (ICRAIE-2014).
[17] Peter J. B. King,et al. Analysis of security attacks on AODV routing , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).
[18] R. H. Jhaveri,et al. MR-AODV: A Solution to Mitigate Blackhole and Grayhole Attacks in AODV Based MANETs , 2013, 2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT).
[19] Farrukh Aslam Khan,et al. Analysis of Detection Features for Wormhole Attacks in MANETs , 2015, FNC/MobiSPC.
[20] Manoj Duhan,et al. An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.
[21] Vandana Dubey,et al. Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).
[22] Santosh S. Sambare,et al. Detecting and Overcoming Blackhole Attack in AODV Protocol , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.
[23] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[24] Sisily Sibichen,et al. An efficient AODV protocol and encryption mechanism for security issues in adhoc networks , 2013, 2013 Annual International Conference on Emerging Research Areas and 2013 International Conference on Microelectronics, Communications and Renewable Energy.