A Novel Taxonomy of Black-Hole Attack Detection Techniques in Mobile Ad-hoc Network (MANET)
暂无分享,去创建一个
[1] Djamel Djenouri,et al. On Detecting Packets Droppers in MANET: A Novel Low Cost Approach , 2007, Third International Symposium on Information Assurance and Security.
[2] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[3] Manpreet Singh,et al. Defending Wireless Ad Hoc Network from Single and Cooperative Black Holes , 2008, 2008 First International Conference on Emerging Trends in Engineering and Technology.
[4] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[5] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE J. Sel. Areas Commun..
[6] K. S. Rangasamy,et al. Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection , 2009 .
[7] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[8] Junhai Luo,et al. Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[9] R. S. Bhuvaneswaran,et al. Design of genetic algorithm based IDS for MANET , 2012, 2012 International Conference on Recent Trends in Information Technology.
[10] Bhupinder Singh,et al. Preventing Black Hole Attack in Mobile Ad Hoc Networks using Secure Clustering , 2015 .
[11] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[12] Govind Sharma,et al. An Efficient Prevention of Black Hole Problem in AODV Routing Protocol in MANET , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[13] Subir Kumar Sarkar,et al. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .
[14] S. Radha,et al. Selfish Scheduler for Packet Scheduling based on Packet Weighted Energy drain rate in MANETs , 2013, J. Comput. Sci..
[15] Sajal K. Das,et al. Cooperative black and gray hole attacks in mobile ad hoc networks , 2008, ICUIMC '08.
[16] Jaideep Srivastava,et al. Distributed Intrusion Detection , 2012 .
[17] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[18] Mona Ghassemian,et al. Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[19] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[20] A. Pushpa. Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[21] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[22] K Vishnu,et al. Detection and Removal of Cooperative Black/Gray hole attack in Mobile AdHoc Networks , 2010 .
[23] Anjali,et al. Detecting Black Hole Attacks in Wireless Sensor Networks using Mobile Agent , 2012 .
[24] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[25] Mehdi Medadian,et al. Combat with Black Hole attack in AODV routing protocol , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[26] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[27] S. Rajashekaran,et al. Neural Networks, Fuzzy Logic and Genetic Algorithms , 2004 .
[28] M. Wahengbam,et al. Intrusion Detection in MANET using fuzzy logic , 2012, 2012 3rd National Conference on Emerging Trends and Applications in Computer Science.
[29] S.S. Ramaswami,et al. Smart Handling of Colluding Black Hole Attacks in MANETs and Wireless Sensor Networks using Multipath Routing , 2006, 2006 IEEE Information Assurance Workshop.
[30] Yibeltal Fantahun Alem,et al. Preventing black hole attack in mobile ad-hoc networks using Anomaly Detection , 2010, 2010 2nd International Conference on Future Computer and Communication.
[31] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[32] Ming-Yang Su,et al. Mitigation of Black-Hole Nodes in Mobile Ad Hoc Networks , 2010, International Symposium on Parallel and Distributed Processing with Applications.
[33] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[34] R. H. Jhaveri,et al. A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[35] Muhammad Khalid Khan,et al. Grouped Black hole Attacks Security Model (GBHASM) for wireless Ad-hoc networks , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[36] Soufiene Djahel,et al. Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges , 2011, IEEE Communications Surveys & Tutorials.
[37] R.Nallusamy,et al. Intrusion Detection In Mobile Ad Hoc Networks Using GA Based Feature Selection , 2009, ArXiv.
[38] Bing Wu,et al. Fuzzy Logic based Intrusion Detection System against Blackhole Attack on AODV in MANET , 2011 .
[39] N. Sharma,et al. The Black-Hole Node Attack in MANET , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[40] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[41] Donald F. Lach,et al. Crisis in Asia , 1950 .
[42] Sukla Banerjee. Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .
[43] Lang Tong,et al. Sensor networks with mobile agents , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..