A Study on the Vulnerability of AODV Routing Protocol to Resource Consumption Attack
暂无分享,去创建一个
[1] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[2] Khadijah Wan Mohd Ghazali,et al. Flooding Distributed Denial of Service Attacks-A Review , 2011 .
[3] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[4] Mingzeng Hu,et al. A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[5] Silvia Giordano,et al. Mobile ad hoc networks , 2002 .
[6] Sunil Taneja,et al. A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .
[7] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[8] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[9] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[10] Raed A. Alsaqour,et al. Effect of network parameters on neighbor wireless link breaks in GPSR protocol and enhancement using mobility prediction model , 2012, EURASIP J. Wirel. Commun. Netw..
[11] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[12] Sanjeev Jain,et al. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.
[13] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[14] Peter J. Bentley,et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.