A Basic Understanding of Routing Protocols for Mobile Ad-Hoc Network with a Security Threat: Black Hole Attack
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] Vincent Park,et al. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .
[4] Myung J. Lee,et al. RTT-based optimal waiting time for best route selection in ad hoc routing protocols , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..
[5] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[6] Kamanashis Biswas,et al. Security Threats in Mobile Ad Hoc Network , 2007 .
[7] Guillermo Alonso Pequeño,et al. Extension to MAC 802.11 for performance improvement in MANET , 2007 .
[8] Chanchal Aghi,et al. Black hole attack in AODV routing protocol: A Review , 2013 .