AODV and SAODV under Attack: Performance Comparison
暂无分享,去创建一个
[1] Azzedine Boukerche,et al. Routing protocols in ad hoc networks: A survey , 2011, Comput. Networks.
[2] Ajit Singh,et al. A Literature Review of Security Attack in Mobile Ad-hoc Networks , 2010 .
[3] Praveen Joshi. Security issues in routing protocols in MANETs at network layer , 2011, WCIT.
[4] K P Manikandan,et al. A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks , 2011 .
[5] Ritu Chauhan,et al. Security Attacks In Mobile Adhoc Networks , 2012 .
[6] Sylvie Perreau,et al. Detect DDoS flooding attacks in mobile ad hoc networks , 2010, Int. J. Secur. Networks.
[7] Prasenjit Choudhury,et al. A simulation analysis of flooding attack in MANET using NS-3 , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).
[8] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[9] N. Sharma,et al. The Black-Hole Node Attack in MANET , 2012, 2012 Second International Conference on Advanced Computing & Communication Technologies.
[10] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[11] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[12] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[13] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[14] Peter J. B. King,et al. Analysis of security attacks on AODV routing , 2013, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013).