Performance Evaluation of AODV under Blackhole Attack
暂无分享,去创建一个
[1] Amitabh Mishra,et al. Collaborative security architecture for black hole attack prevention in mobile ad hoc networks , 2003, Radio and Wireless Conference, 2003. RAWCON '03. Proceedings.
[2] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[3] Mohammed Bouhorma,et al. Performance comparison of ad-hoc routing protocols AODV and DSR , 2009, 2009 International Conference on Multimedia Computing and Systems.
[4] J.-P. Hubaux,et al. Impact of Denial of Service Attacks on Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[5] Nesar Ahmad,et al. Performance Evaluation of TCP Reno and Vegas over different routing protocols for MANETs , 2010, 2010 IEEE 4th International Symposium on Advanced Networks and Telecommunication Systems.
[6] Mukesh Singhal,et al. Secure routing in mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[7] N.M. Din,et al. Trace Analyzer for NS-2 , 2006, 2006 4th Student Conference on Research and Development.
[8] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[9] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[10] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[11] Elizabeth M. Belding-Royer,et al. AODV routing protocol implementation design , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[12] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[13] L. Tamilselvan,et al. Prevention of Blackhole Attack in MANET , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[14] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[15] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[16] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[17] Teerawat Issariyakul,et al. Introduction to Network Simulator NS2 , 2008 .
[18] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[19] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[20] Bello Lawal,et al. Performance Evaluation of CBR and TCP Traffic Models on MANET Using DSR Routing Protocol , 2010, 2010 International Conference on Communications and Mobile Computing.
[21] Mona Ghassemian,et al. Evaluation of Security Problems and Intrusion Detection Systems for Routing Attacks in Wireless Self-Organised Networks , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).
[22] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[23] Tracy Camp,et al. Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.
[24] Paz Morillo,et al. Cryptographic techniques for mobile ad-hoc networks , 2007, Comput. Networks.