Trust Based DSR Routing Protocol for Mitigating Cooperative Black Hole Attacks in Ad Hoc Networks
暂无分享,去创建一个
[1] Kien A. Hua,et al. A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks , 2005, 11th International Conference on Parallel and Distributed Systems (ICPADS'05).
[2] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[3] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[4] Mario Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998 .
[5] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[6] N. Bhalaji,et al. Trust Based Strategy to Resist Collaborative Blackhole Attack in Manet , 2010, BAIP.
[7] Djamel Djenouri,et al. A gradual solution to detect selfish nodes in mobile ad hoc networks , 2010, Int. J. Wirel. Mob. Comput..
[8] Shukor Abd Razak,et al. A Novel Lightweight Authentication Scheme for Mobile Ad Hoc Networks , 2012 .
[9] Jung-Shian Li,et al. Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks , 2006, Comput. Commun..
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[12] Rahmat Budiarto,et al. A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority , 2011 .
[13] Junhai Luo,et al. Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[14] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[17] Syed Asad Hussain,et al. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..
[18] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..