A simulation analysis of flooding attack in MANET using NS-3
暂无分享,去创建一个
[1] Mihaela Cardei,et al. Routing Security in Ad Hoc Wireless Networks , 2010 .
[2] Yi Yang,et al. Generic Threats to Routing Protocols , 2006, RFC.
[3] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[4] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[5] Winston Khoon Guan Seah,et al. Mitigating Route Request Flooding Attacks in Mobile Ad Hoc Networks , 2006, ICOIN.
[6] David A. Maltz,et al. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 , 2007, RFC.
[7] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[8] Joseph P. Macker,et al. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.
[9] G. F. Riley. Large-scale network simulations with GTNetS , 2003, Proceedings of the 2003 Winter Simulation Conference, 2003..
[10] Klaus Wehrle,et al. A Performance Comparison of Recent Network Simulators , 2009, 2009 IEEE International Conference on Communications.
[11] Shiyong Zhang,et al. Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[12] Sachin Kumar Gupta,et al. Routing Protocols in Mobile Ad-hoc Networks \ , 2011 .
[13] Sugata Sanyal,et al. Security Scheme for Distributed DoS in Mobile Ad Hoc Networks , 2010, ArXiv.
[14] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[15] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[16] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[17] H. Bakht. Routing protocols for mobile ad hoc networks , 2005 .
[18] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.