Performance evaluation of mobile ad hoc networks under flooding-based attacks
暂无分享,去创建一个
[1] Ren-Hung Hwang,et al. A novel efficient power-saving MAC protocol for multi-hop MANETs , 2013, Int. J. Commun. Syst..
[2] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[3] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[4] A B M Shawkat Ali,et al. Classifying different denial-of-service attacks in cloud computing using rule-based learning , 2012, Secur. Commun. Networks.
[5] Elmar Gerhards-Padilla,et al. TOGBAD - an approach to detect routing attacks in tactical environments , 2011, Secur. Commun. Networks.
[6] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[7] J. J. Garcia-Luna-Aceves,et al. An end-to-end approach to secure routing in MANETs , 2010, Secur. Commun. Networks.
[8] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[9] Qijun Gu,et al. Analysis of area-congestion-based DDoS attacks in ad hoc networks , 2007, Ad Hoc Networks.
[10] Deepinder P. Sidhu,et al. Open shortest path first (OSPF) routing protocol simulation , 1993, SIGCOMM 1993.
[11] Subramaniam Shamala,et al. A new security model to prevent denial‐of‐service attacks and violation of availability in wireless networks , 2012, Int. J. Commun. Syst..
[12] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[13] Azzedine Boukerche,et al. Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.
[14] Praveen Joshi. Security issues in routing protocols in MANETs at network layer , 2011, WCIT.
[15] Khadijah Wan Mohd Ghazali,et al. Flooding Distributed Denial of Service Attacks-A Review , 2011 .
[16] Ivan Stojmenovic,et al. Position-based routing in ad hoc networks , 2002, IEEE Commun. Mag..
[17] Biswanath Mukherjee,et al. A survey on routing algorithms for wireless Ad-Hoc and mesh networks , 2012, Comput. Networks.
[18] Sunil Taneja,et al. A Survey of Routing Protocols in Mobile Ad Hoc Networks , 2010 .
[19] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[20] Mingzeng Hu,et al. A Survey of Secure Routing in Ad Hoc Networks , 2008, 2008 The Ninth International Conference on Web-Age Information Management.
[21] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[22] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[23] Andrea J. Goldsmith,et al. Energy-constrained modulation optimization , 2005, IEEE Transactions on Wireless Communications.
[24] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[25] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.
[26] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[27] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[28] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[29] Peter J. Bentley,et al. Detecting interest cache poisoning in sensor networks using an artificial immune algorithm , 2010, Applied Intelligence.
[30] Ruey-Maw Chen,et al. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions , 2012, Int. J. Commun. Syst..
[31] Georgia Sakellari. Performance evaluation of the Cognitive Packet Network in the presence of network worms , 2011, Perform. Evaluation.
[32] Michael P. Howarth,et al. Adaptive intrusion detection & prevention of denial of service attacks in MANETs , 2009, IWCMC.
[33] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[34] Raed A. Alsaqour,et al. Effect of network parameters on neighbor wireless link breaks in GPSR protocol and enhancement using mobility prediction model , 2012, EURASIP J. Wirel. Commun. Netw..
[35] Erdal Cayirci,et al. Security in Wireless Ad Hoc and Sensor Networks , 2009 .
[36] Haitham S. Hamza,et al. Secure multicast routing protocols in mobile ad‐hoc networks , 2014, Int. J. Commun. Syst..
[37] Sanjeev Jain,et al. A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks , 2011, ArXiv.
[38] Yang Lu,et al. Data Burst Statistics and Performance Analysis of Optical Burst Switching Networks with Self-Similar Traffic , 2007 .
[39] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[40] Erol Gelenbe,et al. Cognitive packet networks: QoS and performance , 2002, Proceedings. 10th IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunications Systems.