Black Hole Attack Detection and Performance Improvement in Mobile Ad-Hoc Network
暂无分享,去创建一个
[1] Junhai Luo,et al. Black hole attack prevention based on authentication mechanism , 2008, 2008 11th IEEE Singapore International Conference on Communication Systems.
[2] Bohyung Han,et al. Robust routing in wireless ad hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[3] Houda Labiod,et al. Towards a flexible security management solution for dynamic MANETs , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.
[4] Lloyd G. Greenwald,et al. Toward the use of local monitoring and network-wide correction to achieve QoS guarantees in mobile ad hoc networks , 2004, 2004 First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2004. IEEE SECON 2004..
[5] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[6] Sugata Sanyal,et al. A distributed security scheme for ad hoc networks , 2004, CROS.
[7] Jaydip Sen,et al. A mechanism for detection of gray hole attack in mobile Ad Hoc networks , 2007, 2007 6th International Conference on Information, Communications & Signal Processing.
[8] Nirwan Ansari,et al. A router-based technique to mitigate reduction of quality (RoQ) attacks , 2008, Comput. Networks.
[9] Huirong Fu,et al. Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation , 2007, Future Generation Communication and Networking (FGCN 2007).
[10] Nirwan Ansari,et al. Differentiating Malicious DDoS Attack Traffic from Normal TCP Flows by Proactive Tests , 2006, IEEE Communications Letters.
[11] Jens Tölle,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007 .
[12] N. K. Choudhari,et al. AN IMPLEMENTATION POSSIBILITIES FOR AODV ROUTING PROTOCOL IN REAL WORLD , 2010 .
[13] Mukesh Zaveri,et al. Improving AODV Protocol against Blackhole Attacks , 2010 .
[14] S. Dokurer,et al. Performance analysis of ad-hoc networks under black hole attacks , 2007, Proceedings 2007 IEEE SoutheastCon.
[15] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[16] Qi Shi,et al. Statistical Signatures for Early Detection of Flooding Denial-Of-Service Attacks , 2005, SEC.
[17] Junwei Chen,et al. SRSN: Secure Routing Based on Sequence Number for MANETs , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[18] Ming-Yang Su,et al. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems , 2011, Comput. Commun..
[19] Peter Ebinger,et al. Measuring the impact of attacks on the performance of mobile ad hoc networks , 2009, PE-WASUN '09.
[20] Peter Martini,et al. Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs , 2007, 32nd IEEE Conference on Local Computer Networks (LCN 2007).
[21] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[22] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[23] Y. Venkataramani,et al. A Flow Monitoring Scheme to Defend Reduction-of-Quality (RoQ) Attacks in Mobile Ad-hoc Networks , 2010, Inf. Secur. J. A Glob. Perspect..
[24] Seong-Moo Yoo,et al. Black hole attack in mobile Ad Hoc networks , 2004, ACM-SE 42.
[25] Sugata Sanyal,et al. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.
[26] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.