

Extending AODV to Avoid Black Hole Attack (AOMDV)
Abstract
Keywords
References
Lidong Zhou and Zygmunt J. Haas, “Securing Ad Hoc Networks”, published in IEEE network, special issue on network security, November/December, 1999
P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 2002.
K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007
S. Ci, M. Guizani, H. H. Chen, and H. Sharif, "Self-regulating network utilization in mobile ad-hoc wireless networks," IEEE Transaction on Vehicular Technology, vol. 55, no. 4, pp. 1302--1310, 2006.
Liu Jun, Li Zhe, Lin Dan; Liu Ye, “A security enhanced AODV routing protocol based on the credence mechanism”, Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing, Vol. 2, Pp. 719 – 722, 2005.
K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007.
Lacharite Y, Dang Quan Nguyen, Maoyu Wang, Lamont, L, “A trust-based security architecture for tactical MANETS”, IEEE Military Communications Conference (MILCOM), Pp. 1 – 7, 2008.
Burmester M, de Medeiros B. “On the Security of Route Discovery in MANETs”, IEEE Transactions on Mobile Computing, Vol. 8, No. 9, Pp. 1180 – 1188, 2009.
Zhang Guoqing, Mu Dejun, Xu Zhong, Yang Weili, “An Efficient Security Enhancement of AODV Protocol”, Chinese Control Conference (CCC), Pp. 644 – 647, 2007.
Raza I, Hussain S.A. “A Trust based Security Framework for Pure AODV Network”, International Conference on Information and Emerging Technologies (ICIET), Pp. 1 – 6, 2007
XiaoYang Zhang, Sekiya Y, Wakahara Y, “Proposal of a method to detect black hole attack in MANET”, International Symposium on Autonomous Decentralized Systems (ISADS '09), 1 – 6, 2009.
A. Shevtekar, K. Anantharam, and N. Ansari, “Low Rate TCP Denial-of-Service Attack Detection at Edge Routers,” IEEE Commun. Lett., Vol. 9, No. 4, Pp. 363–65, 2005.
Mohammad Al-Shurman and Seong-Moo Yoo, Seungjin Park, “Black hole Attack in Mobile Ad Hoc Networks” Proceedings of the 42nd annual Southeast regional conference ACM-SE 42, Pp. 96-97, 2004.
B. Wu et al., “A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks,” Wireless/Mobile Network Security, Springer, Vol. 17, 2006.
H.D.Trung, W.Benjapolakul, P.M.Duc, “Performance evaluation and comparison of different ad hoc routing protocols”, Department of Electrical Engineering, Chulalongkorn University, Bangkok, Thailand, 2007
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.