Lightweight Detection and Isolation of Black Hole Attacks in Connected Vehicles
暂无分享,去创建一个
[1] Keecheon Kim,et al. Secure Route Discovery for Preventing Black Hole Attacks on AODV-Based MANETs , 2013, 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing.
[2] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[3] Zdravko Karakehayov. Using REWARD to Detect Team Black-Hole Attacks in Wireless Sensor Networks , 2005 .
[4] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Raja Lavanya,et al. Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.
[7] Santosh S. Sambare,et al. Detecting and Overcoming Blackhole Attack in AODV Protocol , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.
[8] Jaydip Sen. Detection of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2013, ArXiv.
[9] M. Gajera. Prevention of Black Hole Attack in Secure Routing Protocol , 2013 .
[10] Yan Zhang,et al. Vehicular Networks: Techniques, Standards, and Applications , 2009 .
[11] Pabitra Mohan Khilar,et al. Securing AODV Routing Protocol in MANET Based on Cryptographic Authentication Mechanism , 2011 .
[12] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[13] R. H. Jhaveri,et al. A Novel Approach for GrayHole and BlackHole Attacks in Mobile Ad Hoc Networks , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[14] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Rakesh Kumar,et al. Prevention of Black Hole Attacks in MANETs , 2018 .
[17] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[18] Jérôme Haerri,et al. Performance comparison of AODV and OLSR in VANETs urban environments under realistic mobility patterns , 2006 .
[19] Kwok-Yan Lam,et al. SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack , 2009, 2009 International Conference on Computational Intelligence and Security.
[20] Sami Muhaidat,et al. Cooperative cross layer detection for blackhole attack in VANET-OLSR , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[21] Marcelo G. Rubinstein,et al. Routing Metrics and Protocols for Wireless Mesh Networks , 2008, IEEE Network.
[22] Kurnool,et al. Prevention of Black Hole Attack in MANET , 2015 .
[23] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .