Variable control chart for detecting black hole attack in vehicular ad-hoc networks

[1]  Mohammad Ali Jabraeil Jamali,et al.  EAODV: detection and removal of multiple black hole attacks through sending forged packets in MANETs , 2019, J. Ambient Intell. Humaniz. Comput..

[2]  Moneeb Gohar,et al.  Cognitive radio assisted WSN with interference aware AODV routing protocol , 2019, J. Ambient Intell. Humaniz. Comput..

[3]  Jingsha He,et al.  A Dual Attack Detection Technique to Identify Black and Gray Hole Attacks Using an Intrusion Detection System and a Connected Dominating Set in MANETs , 2019, Future Internet.

[4]  K. Saravanan,et al.  FD-AOMDV: fault-tolerant disjoint ad-hoc on-demand multipath distance vector routing algorithm in mobile ad-hoc networks , 2018, J. Ambient Intell. Humaniz. Comput..

[5]  Hans Nørgaard Hansen,et al.  Tolerance analysis in manufacturing using process capability ratio with measurement uncertainty , 2017 .

[6]  Sanjay Jasola,et al.  Mitigation and Performance Analysis of Routing Protocols Under Black-Hole Attack in Vehicular Ad-hoc Network (VANET) , 2017, Wirel. Pers. Commun..

[7]  Mohammed Erritali,et al.  Black Hole Attack Detection in Vehicular Ad Hoc Networks Using Statistical Process Control , 2017 .

[8]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[9]  Sami Muhaidat,et al.  Novel cross layer detection schemes to detect blackhole attack against QoS-OLSR protocol in VANET , 2016, Veh. Commun..

[10]  Byung kwan Lee,et al.  A Black Hole Detection Protocol Design based on a Mutual Authentication Scheme on VANET , 2016, KSII Trans. Internet Inf. Syst..

[11]  Abderrahmane Baadache,et al.  Struggling against simple and cooperative black hole attacks in multi-hop wireless ad hoc networks , 2014, Comput. Networks.

[12]  Jalel Ben-Othman,et al.  Analysis and simulation of MAC layer misbehavior in mobile ad-hoc networks , 2014, 2014 5th Workshop on Codes, Cryptography and Communication Systems (WCCCS).

[13]  Mahamod Ismail,et al.  Vehicular communication ad hoc routing protocols: A survey , 2014, J. Netw. Comput. Appl..

[14]  Winston Khoon Guan Seah,et al.  Security threats and solutions in MANETs: A case study using AODV and SAODV , 2012, J. Netw. Comput. Appl..

[15]  L. H. C. Tippett,et al.  ON THE EXTREME INDIVIDUALS AND THE RANGE OF SAMPLES TAKEN FROM A NORMAL POPULATION , 1925 .

[16]  Yasnitsky Leonid Advances in Intelligent Systems and Computing , 2019 .

[17]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[18]  Mohammed Erritali,et al.  A Clustering Algorithm for Detecting and Handling Black Hole Attack in Vehicular Ad Hoc Networks , 2017 .

[19]  Mohammed Erritali,et al.  Quality Control Chart for Detecting the Black Hole Attack in Vehicular Ad-hoc Networks , 2017, EUSPN/ICTH.

[20]  P. U. Dere,et al.  Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack , 2016 .

[21]  C. N. Sminesh,et al.  A Novel Approach for Detection of Single and Collaborative Black Hole Attacks in MANET , 2016 .