ITCA, an IDS and Trust Solution Collaborated with ACK Based Approach to Mitigate Network Layer Attack on MANET Routing
暂无分享,去创建一个
[1] S. K. Setua,et al. Cooperative network intrusion detection system (CNIDS) in mobile adhoc network based on DSR protocol , 2013, Proceedings of 2013 3rd International Conference on Computer Science and Network Technology.
[2] E. Sathiyamoorthy,et al. A new trust-based mechanism for detecting intrusions in MANET , 2017, Inf. Secur. J. A Glob. Perspect..
[3] Elisa Bertino,et al. Fine-Grained Analysis of Packet Loss in MANETs , 2017, IEEE Access.
[4] Ashutosh Bhardwaj. Secure routing in DSR to mitigate black hole attack , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[5] Ming Yu,et al. AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments , 2014, IEEE Transactions on Vehicular Technology.
[6] Amar Taggu,et al. A comprehensive analysis of DoS attacks in Mobile Adhoc Networks , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[7] Dhaval Dave,et al. An effective Black hole attack detection mechanism using Permutation Based Acknowledgement in MANET , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[8] Katta Rama Linga Reddy,et al. Malicious node prevention and mitigation in MANETs using a hybrid security model , 2018, Inf. Secur. J. A Glob. Perspect..
[9] Thouraya Bouabana-Tebibel,et al. A trust-based Probing to secure data routing , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[10] Rachika Gupta. Mobile Adhoc Network(MANETS) : Proposed solution to Security Related Issues , 2011 .
[11] Edwin Hsing-Mean Sha,et al. Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.
[12] Dinesh Naik,et al. Anomaly based intrusion detection of packet dropping attacks in mobile ad-hoc networks , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[13] A. Amara Korba,et al. Survey of Routing Attacks and Countermeasures in Mobile Ad Hoc Networks , 2013, 2013 UKSim 15th International Conference on Computer Modelling and Simulation.
[14] Dinesh Naik,et al. Secure optimal routing protocol in MANETs , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[15] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[16] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.