Removal of Selective Black Hole Attack inMANET by AODV Protocol
暂无分享,去创建一个
[1] Soufiene Djahel,et al. An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol , 2008, 2008 IEEE International Conference on Communications.
[2] Marjan Kuchaki Rafsanjani,et al. Identifying Monitoring Nodes with Selection of Authorized Nodes in Mobile Ad Hoc Networks , 2008 .
[3] Bo Yu,et al. CHEMAS: Identify suspect nodes in selective forwarding attacks , 2007, J. Parallel Distributed Comput..
[4] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[5] 王淑卿,et al. An Optimal Solution for Byzantine Agreement under a Hierarchical Cluster-oriented Mobile Ad-hoc Network , 2010 .
[6] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[7] Bo-Chao Cheng,et al. A Context Adaptive Intrusion Detection System for MANET , 2011, Comput. Commun..
[8] Sukla Banerjee. Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks , 2008 .
[9] Sandeep Lalasaheb Dhende,et al. Detection/Removal of Black Hole Attack in Mobile Ad-Hoc Networks , 2012 .
[10] Nei Kato,et al. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method , 2007, Int. J. Netw. Secur..
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] R.A. Raja Mahmood,et al. A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.
[13] Hossam S. Hassanein,et al. Routeguard: an intrusion detection and response system for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[14] Lei Guo,et al. Routing security scheme based on reputation evaluation in hierarchical ad hoc networks , 2010, Comput. Networks.
[15] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[16] Christos Douligeris,et al. Detecting unauthorized and compromised nodes in mobile ad hoc networks , 2007, Ad Hoc Networks.