Multidimensional Multi-Attribute Approach to Counter the Routing Attacks on MANET
暂无分享,去创建一个
[1] Jairo A. Gutiérrez,et al. DATM: a dynamic attribute trust model for efficient collaborative routing , 2019, Ann. Oper. Res..
[2] N. Radha,et al. Secure and attack aware routing in mobile ad hoc networks against wormhole and sinkhole attacks , 2017, 2017 2nd International Conference on Communication and Electronics Systems (ICCES).
[3] Mozmin Ahmed,et al. Performance of an IDS in an Adhoc Network under Black Hole and Gray Hole attacks , 2014, International Conference on Electronics, Communication and Instrumentation (ICECI).
[4] Shariq Mahmood Khan,et al. A Novel Approach for Reliable Route Discovery in Mobile Ad-Hoc Network , 2015, Wirel. Pers. Commun..
[5] Rahul Rishi,et al. Secure routing in MANETs using three reliable matrices , 2016, 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom).
[6] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[7] Danai Chasaki,et al. Identifying malicious behavior in MANET through data path information , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[8] Govind Sharma,et al. An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[9] R H Goudar,et al. Intrusion detection systems in MANETs using hybrid techniques , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[10] Arnab Majumdar,et al. Different secured routing protocols for mobile Ad Hoc networks and its vulnerabilities: A review , 2015, 2015 International Conference and Workshop on Computing and Communication (IEMCON).
[11] M. Narayanan,et al. Identifying malicious nodes in Mobile Ad-Hoc Networks using polynomial reduction algorithm , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[12] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[13] Vandana Dubey,et al. Modification in routing mechanism of AODV for defending blackhole and wormhole attacks , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).
[14] Anastasios A. Economides,et al. Performance comparison of MANET routing protocols based on real-life scenarios , 2012, 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems.
[15] Xue Jun Li,et al. An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs , 2019, IEEE Transactions on Mobile Computing.
[16] Bharat K. Bhargava,et al. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[17] Subhash K. Shinde,et al. Improved ITCA Method to Mitigate Network-Layer Attack in MANET , 2020 .
[18] Thouraya Bouabana-Tebibel,et al. A trust-based Probing to secure data routing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[19] Rachika Gupta. Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues , 2011 .
[20] Puja Padiya,et al. A generic request/reply based algorithm for detection of blackhole attack in MANET , 2017, 2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon).
[21] Puja Padiya,et al. Improved EAACK scheme for detection and isolation of a malicious node in MANET , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).
[22] Subhash K. Shinde,et al. ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing , 2019, Wirel. Pers. Commun..
[23] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[24] Munesh Chandra Trivedi,et al. Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme , 2017, 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON).
[25] John Haggerty,et al. A survey of the mitigation methods against DoS attacks on MANETs , 2014, 2014 Science and Information Conference.
[26] Ashraf S. Hasan Mahmoud,et al. Video transmission enhancement in presence of misbehaving nodes in MANETs , 2009, Multimedia Systems.
[27] Adwan Yasin,et al. Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique , 2018, Wirel. Commun. Mob. Comput..
[28] Kunagorn Kunavut,et al. Performance and comparative analysis of energy consumption for mobile ad hoc routing protocols , 2014, 2014 14th International Symposium on Communications and Information Technologies (ISCIT).
[29] Puja Padiya,et al. A generic request/reply based algorith for detection of blackhole attack in manet: Simulation result , 2017, 2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT).
[30] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[31] Radhika Saini,et al. Establishment of Dynamic Trust among Nodes in Mobile Ad-Hoc Network , 2011, 2011 International Conference on Computational Intelligence and Communication Networks.
[32] K. Sangeetha,et al. Adaptive ACKnowledgement technique with key exchange mechanism for MANET , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[33] Houda Moudni,et al. Modified AODV routing protocol to improve security and performance against black hole attack , 2016, 2016 International Conference on Information Technology for Organizations Development (IT4OD).
[34] Ignas G. Niemegeers,et al. From Personal Area Networks to Personal Networks: A User Oriented Approach , 2002, Wirel. Pers. Commun..
[35] Ashok Verma,et al. Effect Of Grayhole Attack With Ids Technique For Aodv Routing Protocol Using Network Simulator , 2014 .