Extending AODV to Avoid Black Hole Attack (AOMDV)
Abstract
Keywords
Full Text:
PDFReferences
Lidong Zhou and Zygmunt J. Haas, “Securing Ad Hoc Networks”, published in IEEE network, special issue on network security, November/December, 1999
P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 2002.
K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007
S. Ci, M. Guizani, H. H. Chen, and H. Sharif, "Self-regulating network utilization in mobile ad-hoc wireless networks," IEEE Transaction on Vehicular Technology, vol. 55, no. 4, pp. 1302--1310, 2006.
Liu Jun, Li Zhe, Lin Dan; Liu Ye, “A security enhanced AODV routing protocol based on the credence mechanism”, Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, Vol. 2, Pp. 719 – 722, 2005.
K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
Lacharite Y, Dang Quan Nguyen, Maoyu Wang, Lamont, L, “A trust-based security architecture for tactical MANETS”, IEEE Military Communications Conference (MILCOM), Pp. 1 – 7, 2008.
Burmester M, de Medeiros B. “On the Security of Route Discovery in MANETs”, IEEE Transactions on Mobile Computing, Vol. 8, No. 9, Pp. 1180 – 1188, 2009.
Zhang Guoqing, Mu Dejun, Xu Zhong, Yang Weili, “An Efficient Security Enhancement of AODV Protocol”, Chinese Control Conference (CCC), Pp. 644 – 647, 2007.
Raza I, Hussain S.A. “A Trust based Security Framework for Pure AODV Network”, International Conference on Information and Emerging Technologies (ICIET), Pp. 1 – 6, 2007
XiaoYang Zhang, Sekiya Y, Wakahara Y, “Proposal of a method to detect black hole attack in MANET”, International Symposium on Autonomous Decentralized Systems (ISADS '09), 1 – 6, 2009.
A. Shevtekar, K. Anantharam, and N. Ansari, “Low Rate TCP Denial-of-Service Attack Detection at Edge Routers,” IEEE Commun. Lett., Vol. 9, No. 4, Pp. 363–65, 2005.
Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACM-SE 42, Pp. 96-97, 2004.
B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, Vol. 17, 2006.
H.D.Trung, W.Benjapolakul, P.M.Duc, “Performance evaluation and comparison of different ad hoc routing protocols”, Department of Electrical Engineering, Chulalongkorn University, Bangkok, Thailand, 2007
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.