Enhanced Detection and Elimination Mechanism from Cooperative Black Hole Threats in MANETs
暂无分享,去创建一个
[1] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[2] Toor Gul,et al. Improving Energy Conservation in Wireless Sensor Network Using Energy Harvesting System , 2018 .
[3] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[4] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[5] Abolghasem Sadeghi-Niaraki,et al. Ubiquitous sensor network simulation and emulation environments: A survey , 2017, J. Netw. Comput. Appl..
[6] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[7] Guoyou He. Destination-Sequenced Distance Vector ( DSDV ) Protocol , 2002 .
[8] Mohit Jain,et al. The Intelligent Network , 1989, Springer Berlin Heidelberg.
[9] Ali Dorri,et al. A new approach for detecting and eliminating cooperative black hole nodes in MANET , 2015, 2015 7th Conference on Information and Knowledge Technology (IKT).
[10] K. Gowri Raghavendra Narayan,et al. A Study on Certificate-Based Trust in MANETs , 2018 .
[11] Samiullah Khan,et al. QoS Based Evaluation of Multipath Routing Protocols in Manets , 2017 .
[12] Satria Mandala,et al. A Review of Current Routing Attacks in Mobile Ad Hoc Networks , 2008 .
[13] R. Saravanan,et al. A Novel Security Approach for Detecting Black Hole Attack in MANET , 2010, BAIP.
[14] D. Sathiya,et al. Improved security and routing path learning in MANETs using Beer–Quiche game theoritical model in cloud computing , 2018, Cluster Computing.
[15] Samiullah Khan,et al. Comparative Analysis of Controlled Delay (CoDel) with Deficit Round Robin (DRR) to Overcome Bufferbloat Problem in Wired Network , 2015 .
[16] Consolee Mbarushimana,et al. Comparative Study of Reactive and Proactive Routing Protocols Performance in Mobile Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).
[17] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[18] Sandeep Gupta,et al. EMAODV: Technique to Prevent Collaborative Attacks in MANETs , 2015 .
[19] Samiullah Khan,et al. An Efficient and Reliable Core-Assisted Multicast Routing Protocol in Mobile Ad-Hoc Network , 2016 .
[20] Abderrahmane Baadache,et al. Avoiding Black Hole and Cooperative Black Hole Attacks in Wireless Ad hoc Networks , 2010, ArXiv.
[21] D. Manimegalai,et al. Performance Comparisons of Routing Protocols in Mobile Ad Hoc Networks , 2011, ArXiv.
[22] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[23] Matiullah,et al. Effect of Increasing Number of Nodes on Performance of SMAC, CSMA/CA and TDMA in MANETs , 2018 .
[24] Samiullah Khan,et al. Deterministic Time Markov Chain Modelling of Simultaneous Multipath Transmission Schemes , 2017, IEEE Access.
[25] Shailendra Kumar Shrivastava,et al. Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks , 2018 .
[26] Isaac Woungang,et al. Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks , 2012, FPS.
[27] J. K. Mandal,et al. Effect of Black Hole Attack on MANET Reliability in DSR Routing Protocol , 2018 .
[28] Matiullah,et al. Quality of Service Impact on Deficit Round Robin and Stochastic Fair Queuing Mechanism in Wired-cum-Wireless Network , 2018 .
[29] William Kozma,et al. REAct: resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits , 2009, WiSec '09.
[30] Ali Dorri,et al. An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET , 2017, Wirel. Networks.
[31] Padmalaya Nayak,et al. Impact of Random Mobility Models for Reactive Routing Protocols over MANET , 2016 .
[32] Klaus Wehrle,et al. Modeling and Tools for Network Simulation , 2010, Modeling and Tools for Network Simulation.
[33] Dhaval Dave,et al. An effective Black hole attack detection mechanism using Permutation Based Acknowledgement in MANET , 2014, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[34] Vrinda Tokekar,et al. Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks , 2015, 2015 International Conference on Pervasive Computing (ICPC).
[35] Dilraj Singh,et al. Enhanced Secure Trusted AODV (ESTA) Protocol to Mitigate Blackhole Attack in Mobile Ad Hoc Networks , 2015, Future Internet.
[36] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[37] S. Kalwar. Introduction to reactive protocol , 2010, IEEE Potentials.
[38] Sukhbir Singh,et al. Implementation of Routing Security Aspects in AODV , 2010 .
[39] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[40] J. Premalatha,et al. Performance amelioration of MANETs using cooperative routing with cross-layer design , 2017, Int. J. Bus. Intell. Data Min..
[41] Shailendra Narayan Singh,et al. Wormhole attacks in MANET , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).
[42] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[43] Jiann-Liang Chen,et al. Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[45] V. Sankaranarayanan,et al. Prevention of Co-operative Black Hole Attack in MANET , 2008, J. Networks.
[46] Fawad Ali Khan,et al. ADAPTIVE FAST RETRANSMISSION WITH RESPECT TO RECEIVER BUFFER (RBUF) SPACE IN SIMULTANEOUS MULTIPATH TRANSMISSION (SMT) , 2018 .
[47] Raja Datta,et al. Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..