

Secured Multipath Routing Protocol for Black Hole Attacks based on Secret Sharing in MANETs
Abstract
Keywords
References
Sapna S. Kaushik, P.R.Deshmukh, “Comparison of effectiveness of AODV, DSDV and DSR Routing Protocols in Mobile Ad hoc Networks”, International Journal of Information Technology and Knowledge Management, 2009, Vol. 2(2), pp.499-502.
L. Zhou, Z. J. Haas. Securing ad hoc networks. IEEE Network, 1999, 13(6): 24–30.
Tsirigos, Z. J. Haas. Analysis of multipath routing, Part 2: mitigation of the effects of frequently changing network topologies. IEEE Trans. on Wireless Communications, 2004, 3(2): 500–511.
K. Sanzgiri, D. LaFlamme, B. Dahill, et al. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2005, 23(3): 598–609.
Vaidya, J. Pyun, J. Park, et al. Secure multipath routing scheme for mobile ad hoc network. Proc. of Third IEEE International Symposium on Dependable, Autonomic and Secure Computing, 2007: 163–171.
R. Mavropodi, P. Kotzanikolaou, C. Douligeris. SecMR - a secure multipath routing protocol for ad hoc networks. Ad Hoc Networks, 2007, 5(1): 87–99.
W. Lou, W. Liu, Y. Zhang, et al. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 2009, 15(3): 279–294.
Mahesh K.Marina and Samir R.Das,”Adhoc Multipath On Demand Distance Vector Routing”, Published online in Wiley Inter science, 2006. Pages : 969-988.
Asis Nasipuri , Robert Castarida, Samir R. Das,” Performance of Multipath Routing for On- Demand Protocols in Mobile Ad Hoc Networks”, Mobile Networks and Applications 6, 339–349, 2001 © 2001 Kluwer Academic Publishers. Manufactured in The Netherlands.
Y. Zhang, W. Liu, W. Lou, et al. MASK: anonymous on demand routing in mobile ad hoc networks. IEEE Trans. On Wireless Communication, 2006, 5(9): 2376–2385.
D. Takahashi, X. Hong, Y. Xiao. On-demand anonymous routing with distance vector protecting traffic privacy in wireless multi-hop networks. Proc. of 4th International Conference on Mobile Ad-hoc and Sensor Networks, 2008: 145–151.
J. Kong, X. Hong, M. Gerla. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Trans. on Mobile Computing, 2007, 6(8): 888–902.
J. H. Paik, B. H. Kim, D. H. Lee. A3RP: anonymous and authenticate ad hoc routing protocol. Proc. of 2nd International Conference on Information Security and Assurance, 2008: 67–72.
R. Lu, Z. Cao, L. Wang, et al. A secure anonymous routing protocol with authenticated key exchange for ad hoc networks. Computer Standards and Interfaces, 2007, 29(5): 521–527.
M. Shao, S. Huang. Trust enhanced anonymous routing in mobile ad-hoc networks. Proc. of Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008: 335–341.
H. Aiache, F. Haettel, L. Lebrun, et al. Improving security and performance of an ad hoc network through a multipath routing strategy. Journal in Computer Virology, 2008, 4(4): 267–278.
Y. Dong, T. W. Chim, V. O. K. Li, et al. ARMR: anonymous routing protocol with multiple routes for communications in mobile ad hoc networks. Ad Hoc Networks, 2009, 7(8): 1536– 1550.
D. B. Johnson, D. A. Maltz, Y.C. Hu. The dynamic source routing protocol for mobile Ad Hoc networks (DSR). draftietf- manet-dsr-09.txt, 2003.
Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACM-SE 42, Pp. 96-97, 2004.
B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, Vol. 17, 2006.
R.L.Lagendijik, J.F.C.M.de Jongh, “Multipath Routing in Mobile Ad Hoc Networks”, Traineeship Report, Version 1.2, TU-Delft/TNO, 2003.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.