AERC-Hybrid Technique to Prevent Sybil Attack in MANET
Kumar, M. and Mishra, R., “An Overview of MANET” In IJCSE Vol. 3 No. 1 Feb-March 2012.
Goyal, P. “MANET: Vulnerabilities, Challenges, Attacks, Applications” In IJCEM Vol. 11, January 2011.
Stepashkin, M.” Various Attacks on Mobile Ad-Hoc Networks: an Overview”, ieee(2010).
Piro, C. and Levine, B.N., “Detecting the Sybil attack in mobile ad hoc networks,” in Proc. Securecomm Workshops, 2006, pp 1–11.
Newsome, J. and Perrig, A. “The Sybil Attack in Sensor Networks: Analysis and Defenses” IPSN’04, April 26-27,2004, Berkeley, California, USA.
Yu, H. and Kaminsky, M. “Sybil Guard: Defending Against Sybil Attacks via Social Networks” IEEE, Vol. 16, No. 3, June 2008.
William, S., Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.
Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms” IJCAT, Vol. 4, No.3, January 2010.
Selent, D. “Advanced Encryption Standard“ InSight: Rivier Academic Journal, Volume 6, Number 2, Fall 2010.
Ronald L. Rivest, “The RC5 Encryption Algorithm”
Scott, M. ”An Introduction to Genetic Algorithm” IN 46315 , JCSC 20, 1 (October 2004).
Suen.T and Yasinsac.A, “Ad hoc network security: Peer identification and authentication using signal properties,” presented at the Proc. 6th Annual IEEE SMC Information Assurance Workshop (IAW), New York, Jun. 2005, pp. 432–433.
Levine B. N, Shields.C, and Margolin N. B, “A survey of solutions to the Sybil attack,” Univ. Mass. Amherst, Amherst, Tech. Rep. 2006-052, Oct. 2006.
Hoang Lan Nguyen, Uyen Trang Nguyen. “A study of different types of attacks on multicast in mobile ad hoc networks”. Ad Hoc Networks, Volume 6, Issue 1, Pages 32-46, January 2008.
Margolin N. B. and Levine B. N., “Quantifying resistance to the Sybil attack,” in Financial Cryptography and Data Security. Berlin, Germany: Springer, 2008.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.