

HBRA- Hedge Way for Black Hole Attack in Mobile Ad-Hoc Networks
Abstract
Keywords
References
Y. Zhang and W. Lee, “Intrusion detection in wireless ad-hoc networks,” Sixth Annual International Conference on Mobile Computing and Networking, Boston, August 6-11, 2000.
P. Yi, Z. Dai, S. Zhang, and Y. Zhong, “A new routing attack in mobile ad-hoc networks,” Sixth Annual International Conference on Mobile
Computing and Networking (MobiCom‟2000), Boston, August 6-11, 2000.
E. A. Mary Anita and V. Vasudevan, “Black Hole attack on multicast routing protocols”, JCIT, Vol.4, No.2, pp. 64–68, 2009.
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and endall Nygard,” Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”
H. Deng, W. Li, and Dharma P. Agrawal, “Routing Security in Ad Hoc Networks”, IEEE Communications Magazine, Special Topics on Security in Telecommunication Networks, Vol. 40, No. 10, October 2002, pp. 70-75.
Al-Shurman, M. Yoo, S. Park, “Black hole attack in Mobile Ad Hoc Networks”, ACM Southeast Regional Conference, 2004, pp. 96-97.
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000), “Mitigating routing misbehavior in mobile ad-hoc networks”, Proceedings of the 6th International Conference on Mobile Computing and Networking (MobiCom), ISBN 1-58113- 197-6, pp. 255-265.
S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test bed for misbehavior detection in mobile ad-hoc networks –how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003.
P. Michiardi and R. Molva. “Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks”. In Proceedings of the 6th IFIP Communications and Multimedia Security Conference, pages 107–121, Portorosz, Slovenia, September 2002.
A. Patcha and A. Mishra, “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, Radio and Wireless Conference, 2003. RAWCON ‟03, Proceedings, pp. 75-78, 10-13 Aug. 2003.
S. Bansal and M. Baker. “Observation-based cooperation enforcement in ad hoc networks”, July 2003.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.