References
- D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, Ad Hoc Networking, Chapter 5, Addison-Wesley, 2001, pp.139-172.
- Y.-C. Hu and A. Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, Vol.2, No.3, 2004, pp.28-39.
- J. Li, D. Cordes, and J. Zhang, Power-Aware Routing Protocols in Ad Hoc wireless Networks, IEEE Wireless Communications, Vol.12, No.6, 2005, pp.69-81. https://doi.org/10.1109/MWC.2005.1561947
- M. Al-Shurman, S.-M. Yoo, and S. Park, Black Hole Attack in Mobile Ad Hoc Networks, the 42nd annual southeast regional conference, ACM Southeast Regional Conference, 2004, pp.96-97.
- Y.-C. Hu, A. Perrig, and D. B. Johnson, Wormhole attacks in wireless networks, IEEE Journal on Selected Areas in Communications, Vol.24, No.2, 2006, pp.370-380. https://doi.org/10.1109/JSAC.2005.861394
- P. Yi, Z. Dai, Y. Zhong, and S. Zhang, Resisting Flooding Attacks in Ad Hoc Networks, International Conference on Information Technology: Coding and Computing (ITCC 2005), Vol.2, 2005, pp.657-662.
- C. E. Perkins and E. M. Royer, Ad hoc On-Demand Distance Vector Routing, the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA ‘99), 1999, pp.90-100.
- A. Khan, T. Suzuki, M. Kobayashi, W. Takita, and K. Yamazaki, Packet Size Based Routing for Stable Data Delivery in Mobile Ad-Hoc Networks, IEICE Transactions on Communications, Vol.E91-B, No.7, 2008, pp.2244-2254. https://doi.org/10.1093/ietcom/e91-b.7.2244
- B. A. Forouzan, Cryptography and Network Security, McGraw-Hill, 2008.
- B.-G. Chun and M. Baker, Evaluation of Packet Scheduling Algorithms in Mobile Ad Hoc Networks, ACM Mobile Computing and Communications Review (MC2R), Vol.6, No.3, 2002, pp.36-49. https://doi.org/10.1145/581291.581299
- R. Kumar, M. Misra, and A. K. Sarje, A Routing Protocol for Delay-Sensitive Applications in Mobile Ad Hoc Networks, International Symposium on Ad Hoc and Ubiquitous Computing (ISAUHC '06), 2006, pp.13-18.
- S. Li, Q. Liu, H. Chen, and M. Tan, “A New Method to Resist Flooding Attacks in Ad Hoc Networks, International Conference on Wireless Communications”, Networking and Mobile Computing 2006 (WiCOM 2006), 2006, pp.1-4.
- Z. Y. Xia and J. Wang, DIMH: “A novel model to detect and isolate malicious hosts for mobile ad hoc network”, Elsevier Computer Standards & Interfaces, Vol.28, 2006, pp.660-669. https://doi.org/10.1016/j.csi.2005.08.002
- The VINT Project, The network simulator- ns-2, available at http://www.isi.edu/nsnam/ns/.
Cited by
- A novel user authentication scheme with anonymity for wireless communications 2012, https://doi.org/10.1002/sec.601
- Detecting SYN flooding attacks based on traffic prediction vol.5, pp.10, 2012, https://doi.org/10.1002/sec.428
- A novel intrusion detection framework for wireless sensor networks vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0529-y
- A collaborative routing protocol against routing disruptions in MANETs vol.17, pp.5, 2013, https://doi.org/10.1007/s00779-012-0537-y
- A Novel Solution to Handle DDOS Attack in MANET vol.04, pp.03, 2013, https://doi.org/10.4236/jis.2013.43019