Secure dynamic source routing protocol for defending black hole attacks in mobile Ad hoc networks
暂无分享,去创建一个
[1] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[2] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[3] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[4] Ali Dorri,et al. DEBH: detecting and eliminating black holes in mobile ad hoc network , 2018, Wirel. Networks.
[5] Winston Khoon Guan Seah,et al. Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..
[6] Otto Carlos Muniz Bandeira Duarte,et al. A Self-Organized Mechanism for Thwarting Malicious Access in Ad Hoc Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[7] Edwin Hsing-Mean Sha,et al. Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks , 2016, J. Netw. Comput. Appl..
[8] Peng Zhou,et al. Toward Energy-Efficient Trust System Through Watchdog Optimization for WSNs , 2015, IEEE Transactions on Information Forensics and Security.
[9] Pankaj Sharma,et al. Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[10] Otto Carlos Muniz Bandeira Duarte,et al. An accurate and precise malicious node exclusion mechanism for ad hoc networks , 2014, Ad Hoc Networks.
[11] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[12] Zhiping Jia,et al. Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory , 2011, IET Wirel. Sens. Syst..
[13] Adwan Yasin,et al. Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique , 2018, Wirel. Commun. Mob. Comput..
[14] Xue Jun Li,et al. An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs , 2019, IEEE Transactions on Mobile Computing.
[15] Muthucumaru Maheswaran,et al. A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[16] Rutvij H. Jhaveri,et al. A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks , 2015, Wirel. Networks.
[17] Syed Asad Hussain,et al. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..
[18] Anantha P. Chandrakasan,et al. An application-specific protocol architecture for wireless microsensor networks , 2002, IEEE Trans. Wirel. Commun..
[19] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[20] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[21] Gurveen Vaseer,et al. A Neighbor Trust-Based Mechanism to Protect Mobile Networks , 2019, IEEE Potentials.
[22] Gabriel Maciá-Fernández,et al. Taxonomy and Holistic Detection of Security Attacks in MANETs , 2014 .
[23] Jia Guo,et al. Trust management in mobile ad hoc networks for bias minimization and application performance maximization , 2014, Ad Hoc Networks.