Performance Evaluation of Mobile Ad Hoc Network Routing Protocols under Black Hole Attack
暂无分享,去创建一个
[1] Mohammad Reza Meybodi,et al. Multicast Routing Protocols in MANET , 2012 .
[2] Neha,et al. MULTICAST ROUTING PROTOCOLS IN MANETS , 2012 .
[3] Bruce Christianson,et al. A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack , 2007, Third International Symposium on Information Assurance and Security.
[4] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[5] Karl N. Levitt,et al. A specification-based intrusion detection system for AODV , 2003, SASN '03.
[6] Hrituparna Paul,et al. Performance Evaluation of MANET Routing Protocols , 2012 .
[7] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[8] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[9] Zeyad M. Alfawaer,et al. A Proposed Security Subsystem for Ad Hoc Wireless Networks , 2009, 2009 International Forum on Computer Science-Technology and Applications.
[10] Khaldoun Al Agha,et al. A shared secret-based algorithm for securing the OLSR routing protocol , 2006, Telecommun. Syst..
[11] Xu Qiao-ping,et al. Secure On-demand Routing Protocol for Ad Hoc Network , 2010 .
[12] Mukesh Singhal,et al. A Secure Routing Protocol for Wireless Ad Hoc Networks , 2006, Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS'06).
[13] Peter Martini,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[14] Dirk Westhoff,et al. Context aware detection of selfish nodes in DSR based ad-hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[15] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[16] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[17] Stefaan Seys. Security Architecture for Wireless Ad hoc Networks , 2004 .