ROUTING ATTACKS IN MOBILE AD HOC NETWORKS: AN OVERVIEW
暂无分享,去创建一个
Imran Ghani | Mojtaba Ghanaatpisheh Sanaei | Aida Hakemi | Seung Ryul Jeong | S. Jeong | I. Ghani | Aida Hakemi
[1] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[2] Carlos Becker Westphall,et al. Evaluation of QoS Metrics in Ad Hoc Networks with the use of Secure Routing Protocols , 2006, 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006.
[3] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[4] Prodipto Das,et al. Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.
[5] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[6] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[7] Pla Uni,et al. Secure Routing for Mobile Ad hoc Networks , 2005 .
[8] John S. Baras,et al. Intrusion Detection System Resiliency to Byzantine Attacks: The Case Study of Wormholes in OLSR , 2007, MILCOM 2007 - IEEE Military Communications Conference.
[9] P. Dananjayan,et al. Energy Efficient and Secured Cluster Based Routing Protocol for Wireless Sensor Networks , 2011 .
[10] Reza Curtmola,et al. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks , 2008, TSEC.
[11] P. Khatri,et al. A Survey on Security issues in Mobile ADHOC networks , 2009 .
[12] Kamanashis Biswas,et al. Security Threats in Mobile Ad Hoc Network , 2007 .
[13] Boon-Chong Seet,et al. The Handbook of Ad Hoc Wireless Networks , 2002 .
[14] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[15] M. GhanaatPisheh Sanaei,et al. Performance Analysis of SRTLD and BIOSARP Protocols in Wireless Sensor Networks , 2013 .
[16] Hannes Hartenstein,et al. A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.
[17] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[18] Majid Bakhtiari,et al. Performance evaluation of routing protocol on AODV and DSR under wormhole attack , 2013 .
[19] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[20] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[21] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[22] Satria Mandala,et al. A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .