References
- H.Nishiyama, T.Ngo, N. Ansari, N.Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," IEEE Transactions on Wireless Communications, Vol.11, No.3, pp. 1158 - 1166, 2012. https://doi.org/10.1109/TWC.2012.010312.110783
- Yingbin Liang, Poor, H.V., Lei Ying, "Secrecy Throughput of MANETs Under Passive and Active Attacks," IEEE Transactions on Information Theory, Vol.57, No.10, pp. 6692 - 6702, 2011.
- Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu, "Risk-Aware Mitigation for MANET Routing Attacks," IEEE Transactions on Dependable and Secure Computing, Vol.9, No.2, pp. 250 - 260, 2012. https://doi.org/10.1109/TDSC.2011.51
- Deng, H., Li, W., & Agrawal, D., "Routing Security in Wireless Ah Hoc Networks," IEEE Communications Magazine, Vol.40, No.10, pp.70 - 75, 2002.
- Johnson DB, Maltz DA, Broch J., "DSR: The dynamic source routing protocol for multiple wireless ad hoc networks," Ad Hoc Networking. Addison-Wesley, pp.139-172, 2001.
- Cai, J.W., Yi, P., Tian, Y., Zhou Y.K., Liu N., "The Simulation and Comparison of Routing Attacks on DSR Protocol," in Proc. of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009 (WiCom '09), Beijing, China, September, 2009.
- Bo Sun; Yong Guan, Jian Chen, Pooch U.W., "Detecting Black-hole Attack in Mobile Ad Hoc Networks," in Proc. of 5th European Personal Mobile Communications Conference, pp.490-495, 2003.
- Patcha, A., Mishra, A., "Collaborative security architecture for black hole attack prevention in mobile ad hoc networks," Radio and Wireless Conference, pp.75-78, 2003.
- Gao Xiaopeng, Chen Wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks," in Proc. of IFIP International Conference on Network and Parallel Computing Workshops, pp.209-214, 2007.
- D. Boneh, C. Gentry, B. Lynn, H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Advances in Cryptology-EUROCRYPT'03: LNCS 2656. Berlin: Springer-Veralg, pp.416-432, 2003.
- Shila, D.M., Anjali, T., "Defending selective forwarding attacks in WMNs," in Proc. of IEEE International Conference on Electro/Information Technology, pp.96-101, 2008.
- Akyildiz, I. F., & Wang, X., "A Survey on Wireless Mesh Networks," IEEE Communications Magazine, Vol.43, No. 9, pp.23-30, 2005. https://doi.org/10.1109/MCOM.2005.1509968
- D.S J De Couto, D.Aguayo, J.Bicket, and R.Morris, "A High-Throughput Path Metric for Multi-Hop Wireless routing," in Proc. of ACM International Conference on Mobile Computing and Networking (ACM Mobicom2003), 2003.
- Kevin Fall and Kannan Varadhan, NS notes and documentation, The VINT Project, UC Berkely, LBL, USC/ISI, and Xerox PARC, 1997.
- J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. of ACM International Conference on Mobile Computing and Networking (ACM Mobicom1998), 1998.
- M. Just, E. Kranakis, and T. Wan, "Resisting Malicious Packet Dropping In Wireless Ad Hoc Networks," International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW2003), Oct. 2003.
Cited by
- Refined trust energy-ad hoc on demand distance vector (ReTE-AODV) routing algorithm for secured routing in MANET vol.23, pp.7, 2013, https://doi.org/10.1007/s11276-016-1284-1