MOBILE AD HOC NETWORKS UNDER WORMHOLE ATTACK: A SIMULATION STUDY
暂无分享,去创建一个
[1] Efraim Turban,et al. Decision support systems and intelligent systems , 1997 .
[2] Prabir Bhattacharya,et al. Testing Intrusion Detection Systems in MANET: A Comprehensive Study , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[3] Subir Kumar Sarkar,et al. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .
[4] Carlos Miguel Tavares Calafate,et al. ns-2 vs. OPNET: a comparative study of the IEEE 802.11e technology on MANET environments , 2008, SimuTools.
[5] Pietro Manzoni,et al. On the interaction between IEEE 802.11e and routing protocols in mobile ad-hoc network , 2005, 13th Euromicro Conference on Parallel, Distributed and Network-Based Processing.
[6] Elmar Schoch,et al. Simulation of ad hoc networks: ns-2 compared to JiST/SWANS , 2008, SimuTools.
[7] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[8] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[9] Cong Jin,et al. Invulnerability Assessment for Mobile Ad Hoc Networks , 2008, 2008 Workshop on Power Electronics and Intelligent Transportation System.
[10] S. Sharma,et al. Simulation Study Of Blackhole Attack in the Mobile Ad hoc Networks ” , 2008 .