Ensuring survivability against Black Hole Attacks in MANETS for preserving energy efficiency
暂无分享,去创建一个
[1] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[2] Jagpreet Singh,et al. Performance Analysis of MANET under Blackhole Attack , 2009, 2009 First International Conference on Networks & Communications.
[3] K Somasundaram,et al. IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET , 2017, Inf. Secur. J. A Glob. Perspect..
[4] Shadi Aljawarneh,et al. A resource-efficient encryption algorithm for multimedia big data , 2017, Multimedia Tools and Applications.
[5] Rich McMahon. Introduction to Networking , 2003 .
[6] Prodipto Das,et al. Security Measures for Black Hole Attack in MANET: An Approach , 2012, ArXiv.
[7] Kamarularifin Abd. Jali,et al. MITIGATION OF BLACK HOLE ATTACKS FOR AODV ROUTING PROTOCOL , 2011 .
[8] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[9] Irshad Ullah,et al. Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols , 2010 .
[10] Shadi Aljawarneh,et al. Investigations of automatic methods for detecting the polymorphic worms signatures , 2016, Future Gener. Comput. Syst..
[11] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[12] Sugata Sanyal,et al. Journal of Digital Information Management Impact of Node Mobility on Manet Routing Protocols Models , 2022 .
[13] Daya Gupta,et al. Effect of Black Hole Attack on MANET Routing Protocols , 2013 .
[14] A. L. Sangal,et al. "Performance Analysis of DSR, AODV Routing Protocols based on Wormhole Attack in Mobile Adhoc Network" , 2011 .
[15] Vahid Heydari,et al. E2EACK: an end-to-end acknowledgment-based scheme against collusion black hole and slander attacks in MANETs , 2016, Wirel. Networks.
[16] Seokhoon Yoon,et al. An Efficient Black Hole Detection Method using an Encrypted Verification Message in Mobile Ad Hoc Networks , 2012 .
[17] Amol A. Bhosle,et al. Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET , 2012 .
[18] Christian Bonnet,et al. Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.
[19] Ashwini Patil,et al. Blackhole attack detection and prevention by real time monitoring , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[20] Muneer O. Bani Yassein,et al. A New Protocol for Detecting Black Hole Nodes in Ad Hoc Networks , 2011, Int. J. Commun. Networks Inf. Secur..
[21] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[22] Sakuna Charoenpanyasak,et al. CAODV Free Bl ackhole Attack in Ad Hoc Networks , 2012 .