A review of black-hole attack mitigation techniques and its drawbacks in Mobile Ad-hoc Network
暂无分享,去创建一个
[1] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[2] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[3] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[4] Mehdi Medadian,et al. Combat with Black Hole attack in AODV routing protocol , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).
[5] Rutvij H. Jhaveri,et al. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.
[6] Pramod K. Varshney,et al. An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs , 2007, IEEE Transactions on Mobile Computing.
[7] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[8] Guru Tegh,et al. Impact of Blackhole Attack in MANET , 2010 .
[9] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[10] Shashi Gurung,et al. A novel approach for mitigating gray hole attack in MANET , 2018, Wirel. Networks.
[11] D. Bhattacharyya,et al. Two-Level Secure Re-routing (TSR) in Mobile Ad Hoc Networks , 2012, 2012 International Conference on Advances in Mobile Network, Communication and Its Applications.
[12] Djamel Djenouri,et al. On Detecting Packets Droppers in MANET: A Novel Low Cost Approach , 2007, Third International Symposium on Information Assurance and Security.
[13] Celia Li,et al. SEAODV: A Security Enhanced AODV Routing Protocol for Wireless Mesh Networks , 2010, Trans. Comput. Sci..
[14] Neha Sood,et al. Enhanced 2ACK scheme for reducing routing overhead in MANETs , 2014, 2014 International Conference on Parallel, Distributed and Grid Computing.
[15] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[16] Mukesh Zaveri,et al. Improving AODV Protocol against Blackhole Attacks , 2010 .
[17] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[18] Keecheon Kim,et al. Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[19] H. T. Mouftah,et al. AACK: Adaptive Acknowledgment Intrusion Detection for MANET with Node Detection Enhancement , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[20] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[21] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[22] Ilango Krishnamurthi,et al. Modified DSR protocol for detection and removal of selective black hole attack in MANET , 2014, Comput. Electr. Eng..
[23] Celia Li,et al. SEAODV: A Security Enhanced AODV routing protocol for wireless mesh networks , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[24] Geng Peng,et al. Routing Attacks and Solutions in Mobile Ad hoc Networks , 2006, 2006 International Conference on Communication Technology.
[25] Dayanand Ambawade,et al. Dynamic Sequence Number Thresholding protocol for detection of blackhole attack in Wireless Sensor Network , 2015, 2015 International Conference on Communication, Information & Computing Technology (ICCICT).
[26] Jianwei Liu,et al. A Performance Analysis of AODV Routing Protocol under Combined Byzantine Attacks in MANETs , 2009, 2009 International Conference on Computational Intelligence and Software Engineering.
[27] S. Dokurer,et al. Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.
[28] Rutvij H. Jhaveri,et al. DoS Attacks in Mobile Ad Hoc Networks: A Survey , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[29] Avita Katal,et al. A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission , 2013, 2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES.
[30] B. Kannapiran,et al. Enhancing manet security using hybrid techniques in key generation mechanism , 2014, 2014 International Conference on Electronics and Communication Systems (ICECS).
[31] Ali Dorri,et al. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.
[32] B. Paramasivan,et al. Ant based Defense Mechanism for Selective Forwarding Attack in MANET , 2015, 2015 31st IEEE International Conference on Data Engineering Workshops.
[33] J. Scolforo,et al. Improving Route Discovery for AODV to Prevent Blackhole and Grayhole Attacks in MANETs , 2022 .
[34] Manjeet Singh,et al. Black Hole Attack Detection in MANET Using Mobile Trust Points with Clustering , 2016 .
[35] Pramod K. Varshney,et al. TWOACK: preventing selfishness in mobile ad hoc networks , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[36] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[37] Rutvij H. Jhaveri,et al. A Novel Solution for Grayhole Attack in AODV Based MANETs , 2012 .
[38] Abderrahmane Baadache,et al. Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks , 2012, J. Netw. Comput. Appl..
[39] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[40] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[41] Anil K. Sarje,et al. Enhancing performance of AODV against Black hole Attack , 2012, CUBE.
[42] Christoforos Ntantogian,et al. Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks , 2017, Comput. Networks.
[43] Robert F. Mills,et al. RIPsec - Using reputation-based multilayer security to protect MANETs , 2012, Comput. Secur..
[44] Fatemeh Barani,et al. A hybrid approach for dynamic intrusion detection in ad hoc networks using genetic algorithm and artificial immune system , 2014, 2014 Iranian Conference on Intelligent Systems (ICIS).
[45] S. Indu,et al. Secure route discovery in AODV in presence of blackhole attack , 2016, CSI Transactions on ICT.
[46] Raja Datta,et al. Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..
[47] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[48] Chang-Wu Yu,et al. A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks , 2007, PAKDD Workshops.