A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
暂无分享,去创建一个
[1] Syed Jalal Ahmad,et al. Detection of Black Hole Attack Using Code Division Security Method , 2015 .
[2] K. Selvamani,et al. Reputed Packet Delivery Using Efficient Audit Misbehaviour Detection and Monitoring Method in Mobile Ad Hoc Networks , 2015 .
[3] E. A. Mary Anita,et al. Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure , 2009, Inf. Secur. J. A Glob. Perspect..
[4] Ravinder Singh,et al. Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET , 2017, Cluster Computing.
[5] Sushanta Karmakar,et al. Intrusion detection in Mobile Ad-hoc Networks: Bayesian game formulation , 2016 .
[6] Abdul Hanan Abdullah,et al. A review of blackhole attack in mobile adhoc network , 2013, 2013 3rd International Conference on Instrumentation, Communications, Information Technology and Biomedical Engineering (ICICI-BME).
[7] Hesham A. Ali,et al. A recommender system for team formation in MANET , 2015, J. King Saud Univ. Comput. Inf. Sci..
[8] Paz Morillo,et al. Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.
[9] Xiangjian He,et al. A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis , 2014, IEEE Transactions on Parallel and Distributed Systems.
[10] Neeraj Suri,et al. P2P routing table poisoning: A quorum-based sanitizing approach , 2017, Comput. Secur..
[11] Vani A. Hiremani,et al. Eliminating co-operative blackhole and grayhole attacks using modified EDRI table in MANET , 2013, 2013 International Conference on Green Computing, Communication and Conservation of Energy (ICGCE).
[12] Rutvij H. Jhaveri,et al. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.
[13] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[14] Keyvan RahimiZadeh,et al. Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks , 2014, Secur. Commun. Networks.
[15] M. Poongodi,et al. Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem , 2015 .
[16] Raja Datta,et al. Collaborative techniques for intrusion detection in mobile ad-hoc networks , 2008, Ad Hoc Networks.
[17] Zhen Ma,et al. A Distributed and Adaptive Trust Evaluation Algorithm for MANET , 2016, Q2SWinet@MSWiM.
[18] Weijie Liu,et al. A cluster-based countermeasure against blackhole attacks in MANETs , 2014, Telecommun. Syst..
[19] Muhammad Imran,et al. A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks , 2017, Future Gener. Comput. Syst..
[20] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[21] Shashi Gurung,et al. A dynamic threshold based approach for mitigating black-hole attack in MANET , 2018, Wirel. Networks.
[22] Djamel Djenouri,et al. On eliminating packet droppers in MANET: A modular solution , 2009, Ad Hoc Networks.
[23] Edwin Hsing-Mean Sha,et al. Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..
[24] Jacob C. N. Schuldt,et al. On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks , 2015, ICISC.
[25] Shashi Gurung,et al. A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network , 2017, 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET).
[26] Shukor Abd Razak,et al. Trust-Based Routing Mechanism in MANET: Design and Implementation , 2013, Mob. Networks Appl..
[27] Arvind Dhaka,et al. Gray and Black Hole Attack Identification Using Control Packets in MANETs , 2015 .
[28] Nitin Khanna,et al. Critical Review of Techniques for Detection and Mitigation of Co-operative Blackhole Attack in MANET , 2018 .
[29] Nabendu Chaki,et al. CORIDS: a cluster-oriented reward-based intrusion detection system for wireless mesh networks , 2014, Secur. Commun. Networks.
[30] Juan-Carlos Cano,et al. CoCoWa: A Collaborative Contact-Based Watchdog for Detecting Selfish Nodes , 2015, IEEE Transactions on Mobile Computing.
[31] K Somasundaram,et al. IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET , 2017, Inf. Secur. J. A Glob. Perspect..
[32] Danista Khan,et al. Study of detecting and overcoming black hole attacks in MANET: A review , 2017, 2017 International Symposium on Wireless Systems and Networks (ISWSN).
[33] Hung-Min Sun,et al. A novel acknowledgment-based approach against collude attacks in MANET , 2012, Expert Syst. Appl..
[34] Steven Furnell,et al. Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks , 2008, Ad Hoc Networks.
[35] Turgay Korkmaz,et al. EMLTrust: An enhanced Machine Learning based Reputation System for MANETs , 2012, Ad Hoc Networks.
[36] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[37] Yusheng Ji,et al. Energy efficient zone based routing protocol for MANETs , 2015, Ad Hoc Networks.
[38] Anupam Joshi,et al. Threshold-based intrusion detection in ad hoc networks and secure AODV , 2008, Ad Hoc Networks.
[39] Leena Ragha,et al. Implementing and Improving the Performance of AODV by Receive Reply Method and Securing it from Black Hole Attack , 2015 .
[40] Vimal Kumar,et al. An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network , 2015 .
[41] Salvatore Marano,et al. Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET , 2009, IWCMC.
[42] R. Leela Velusamy,et al. A Cooperative Routing for MANET Based on Distributed Trust and Energy Management , 2015, Wirel. Pers. Commun..
[43] Jigyasu Dubey,et al. Opinion based trusted AODV routing protocol for MANET , 2016, ICTCS '16.
[44] Zhang Jianyu,et al. A novel NP-based security scheme for AODV routing protocol , 2008 .
[45] Shishupal Kumar,et al. Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing Scheme☆ , 2015 .
[46] Pankaj Chandre,et al. Dynamic Cluster Head Selection to Detect Gray Hole Attack using Intrusion Detection System in MANETs , 2015, ICCCT '15.
[47] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[48] Tarek R. Sheltami,et al. Implementation of A3ACKs Intrusion Detection System under Various Mobility Speeds , 2014, ANT/SEIT.
[49] S. Saravana Kumar,et al. Dynamic anomaly detection using cross layer security in MANET , 2017, Comput. Electr. Eng..
[50] Gisung Kim,et al. A distributed sinkhole detection method using cluster analysis , 2010, Expert Syst. Appl..
[51] Elmar Gerhards-Padilla,et al. TOGBAD - an approach to detect routing attacks in tactical environments , 2011, Secur. Commun. Networks.
[52] R. Parthasarathy,et al. Source based trusted AODV routing protocol for mobile ad hoc networks , 2012, ICACCI '12.
[53] Sehun Kim,et al. A cooperative-sinkhole detection method for mobile ad hoc networks , 2010 .
[54] Rutvij H. Jhaveri,et al. I-EDRI Scheme to Mitigate Grayhole Attack in MANETs , 2015 .
[55] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[56] William Johnson,et al. A distributed framework for detecting selfish nodes in MANET using Record- and Trust-Based Detection (RTBD) technique , 2014, EURASIP J. Wirel. Commun. Netw..
[57] Bu-Sung Lee,et al. CARRADS: Cross layer based adaptive real-time routing attack detection system for MANETS , 2010, Comput. Networks.
[58] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[59] Y. Venkataramani,et al. Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network , 2012, Inf. Secur. J. A Glob. Perspect..
[60] Jaydip Sen,et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[61] Manoj Misra,et al. Misbehaving nodes detection through opinion based trust evaluation model in MANETs , 2011, ICWET.
[62] N. Kannan,et al. Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET , 2017, Wirel. Networks.
[63] Christoforos Ntantogian,et al. Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks , 2017, Comput. Networks.
[64] Kathiravan Kannan,et al. Cross-layer based multiclass intrusion detection system for secure multicast communication of MANET in military networks , 2016 .
[65] Bo Wang,et al. A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..
[66] Lyes Khoukhi,et al. A stochastic approach for packet dropping attacks detection in mobile Ad hoc networks , 2017, Comput. Networks.
[67] Gabriel Maciá-Fernández,et al. A model of data forwarding in MANETs for lightweight detection of malicious packet dropping , 2015, Comput. Networks.
[68] C. N. Sminesh,et al. A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET , 2016 .
[69] Mohammad S. Obaidat,et al. A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks , 2016, Secur. Commun. Networks.
[70] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[71] Nitin Khanna. Avoidance and Mitigation of All Packet Drop Attacks in MANET using Enhanced AODV with Cryptography , 2016 .
[72] Ali Dorri,et al. DEBH: detecting and eliminating black holes in mobile ad hoc network , 2018, Wirel. Networks.
[73] Rituparna Chaki,et al. BHIDS: a new, cluster based algorithm for black hole IDS , 2010, Secur. Commun. Networks.
[74] Ilango Krishnamurthi,et al. Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..
[75] Nitin Khanna,et al. Mitigation of Collaborative Blackhole Attack using TRACEROUTE Mechanism with Enhancement in AODV Routing Protocol , 2016 .
[76] J. K. Mandal,et al. Detection of Blackhole Behaviour Using Triangular Encryption in NS2 , 2013 .
[77] Deepika Kukreja,et al. Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack , 2018, J. Ambient Intell. Humaniz. Comput..
[78] Koushik Majumder,et al. Selfish Node Detection and Low Cost Data Transmission in MANET using Game Theory , 2015 .
[79] Hung-Min Sun,et al. A collaborative routing protocol against routing disruptions in MANETs , 2012, Personal and Ubiquitous Computing.
[80] Mohammad S. Obaidat,et al. A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks , 2014, Secur. Commun. Networks.
[81] Zeinab Movahedi,et al. A green trust‐distortion resistant trust management scheme on mobile ad hoc networks , 2017, Int. J. Commun. Syst..
[82] Joni da Silva Fraga,et al. Algorithms for a distributed IDS in MANETs , 2014, J. Comput. Syst. Sci..
[83] Michael P. Howarth,et al. Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..
[84] Sandeep Gupta,et al. EMAODV: Technique to Prevent Collaborative Attacks in MANETs , 2015 .
[85] Ilango Krishnamurthi,et al. Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks , 2014 .
[86] Juan-Carlos Cano,et al. Accurate detection of black holes in MANETs using collaborative bayesian watchdogs , 2012, 2012 IFIP Wireless Days.
[87] E. Sathiyamoorthy,et al. A new trust-based mechanism for detecting intrusions in MANET , 2017, Inf. Secur. J. A Glob. Perspect..
[88] M. Karthikeyan,et al. Localized Secure Routing Architecture Against Cooperative Black Hole Attack in Mobile Ad Hoc Networks , 2016, Wirel. Pers. Commun..
[89] Edwin Hsing-Mean Sha,et al. Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.
[90] Michael P. Howarth,et al. An intrusion detection & adaptive response mechanism for MANETs , 2014, Ad Hoc Networks.
[91] Jose L. Muñoz,et al. A game theoretic trust model for on-line distributed evolution of cooperation inMANETs , 2011, J. Netw. Comput. Appl..
[92] M. Rajesh Babu,et al. A Novel Honeypot Based Detection and Isolation Approach (NHBADI) To Detect and Isolate Black Hole Attacks in MANET , 2016, Wirel. Pers. Commun..
[93] Ali Dorri,et al. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.
[94] Prabir Bhattacharya,et al. A game-theoretic intrusion detection model for mobile ad hoc networks , 2008, Comput. Commun..
[95] G. Usha Devi,et al. Fuzzy Based Intrusion Detection Systems in MANET , 2015 .
[96] Manjeet Singh,et al. Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering , 2016 .
[97] P. U. Dere,et al. Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack , 2016 .
[98] Ankit D. Patel,et al. Dual Security Against Grayhole Attack in MANETs , 2015 .
[99] Li-Der Chou,et al. A survey of black hole attacks in wireless mobile ad hoc networks , 2011, Human-centric Computing and Information Sciences.
[100] K. Selvakumar,et al. TRUCE – An Adaptive Trust Management Algorithm Over MANET for Service-Based Mobile Computing Environments , 2011, Inf. Secur. J. A Glob. Perspect..
[101] Anil Kumar Verma,et al. Experimental analysis of AODV, DSDV and OLSR routing protocol for flying adhoc networks (FANETs) , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).