The Impact of selfishness Attack on Mobile Ad Hoc Network
暂无分享,去创建一个
Raed A. Alsaqour | Maha S. Abdelhaq | Noura Albrahim | Manar Alshehri | Maram Alshehri | Shehana Alserayee | Eatmad Almutairi | Farah Alnajjar
[1] Peter J. B. King,et al. AODV and SAODV under Attack: Performance Comparison , 2014, ADHOC-NOW.
[2] V. M. Thakare,et al. Selfish attack detection in mobile Ad hoc networks , 2017, 2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS).
[3] Sachin Garg,et al. Performance Analysis of AODV and TORA under DDoS Attack in MANETs , 2014 .
[4] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[5] Padmalaya Nayak,et al. Impact of Random Mobility Models for Reactive Routing Protocols over MANET , 2016 .
[6] Ali Abdalla Etorban,et al. The design and performance evaluation of a proactive multipath routing protocol for mobile ad hoc networks , 2012 .
[7] Ivan Andonovic,et al. Survey of Reactive and Hybrid Routing Protocols for Mobile Ad Hoc Networks , 2011, Int. J. Commun. Networks Inf. Secur..
[8] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[9] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[10] V. Rajeshkumar. Comparative Study of AODV, DSDV and DSR Routing Protocols in MANET Using Network Simulator-2 , 2013 .
[11] Mahdieh Ghazvini,et al. A modified algorithm to improve security and performance of AODV protocol against black hole attack , 2015, Wireless Networks.
[12] Nan Wang,et al. Performance comparison and evaluation of the proactive and reactive routing protocols for MANETs , 2017, 2017 Wireless Telecommunications Symposium (WTS).
[13] Arivoli Thangadurai,et al. Handling Selfishness over Collaborative Mechanism in a MobileAd hoc Network , 2018, J. Cyber Secur. Mobil..
[14] Markus Rupp,et al. Two-ray models in mmWave communications , 2017, 2017 IEEE 18th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[15] Md. Abu Naser Bikas,et al. Experimental Analysis of AODV & DSR over TCP & CBR Connections with Varying Speed and Node Density in VANET , 2012, ArXiv.
[16] Raed A. Alsaqour,et al. Novel Method of Improving Quality of Service for Voice over Internet Protocol Traffic in Mobile Ad Hoc Networks , 2019, Int. J. Commun. Networks Inf. Secur..
[17] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[18] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[19] Shashi Gurung,et al. A novel approach for mitigating gray hole attack in MANET , 2018, Wirel. Networks.
[20] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.