A Robust Intrusion Detection in Mobile Ad-hoc Networks with Reactive Routing Protocols
Abstract
Keywords
Full Text:
PDFReferences
A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, Wireless/Mobile Network Security, Chapter 12 2006 Springer.
A Review of Current Routing Attacks in Mobile Ad Hoc Networks, Rashid Hafeez Khokhar, Md Asri Ngadi & Satria Mandala, International Journal of Computer Science and Security, volume (2) issue (3)
Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators, H. Chris Tseng, B. Jack Culpepper, Computers & Security (2005) 24, 561-570
The dynamic source routing protocol for multi-hop wireless ad hoc networks, Johnson DB, Maltz DA, Broch J., In: EP C, editor. Ad Hoc Networking. Boston: Addison-Wesley; 2001. p. 139–72.
Collaborative techniques for intrusion detection in mobile ad-hoc networks., Marchang N, Datta R., Ad Hoc Networks 2008;6:508–23.
A cooperative-sinkhole detection method for mobile ad hoc networks., Gisung Kim, Younggoo Han, SehunKim, International Journal of Electronics and Communication 64 (2010) 390–397
An Analysis of Collaborative Attacks on Mobile Ad hoc Networks, Cong Hoan Vu, Adeyinka Soneye, Master Thesis, Computer Science, Thesis no: MCS-2009:4, June 2009
Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols, Irshad Ullah, Shoaib Ur Rehman, Master Thesis, Electrical Engineering, Thesis no: MEE-2010-2698, June, 2010
http://www.scribd.com/doc/36957710/Mitigating-Black-Hole-Attack-in-Manet
http://www.britannica.com/bps/additionalcontent/18/32588605/Prevention-of-Cooperative-Black-Hole-Attack-in-MANET
http://koasas.kaist.ac.kr/handle/10203/18729
http://www.seminarprojects.com/Thread-security-issues-in-manet-full-report
A distributed sinkhole detection method using cluster analysis, Woochul Shim , Gisung Kim, Sehun Kim, Expert Systems with Applications (2010), doi:10.1016/j.eswa.2010.05.028
Stefan K. Stafrace, Nick Antonopoulos Military tactics in agent-based sinkhole attack detection for wireless ad hoc networks Computer Communications 33 (2010) 619–638.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.