References
- K. Obraczka and G. Tsuiuk, "Multicast Routing Issues in Ad Hoc Networks," IEEE Int. Conf. Universal Pers. Commun., Florence, Italy, vol. 1, Oct. 5-9, 1998, pp. 751-756.
- H.L. Nguyen and U.T. Nguyen, "A Study of Different Attacks on Multicast in Mobile Ad Hoc Networks," Ad Hoc Netw., vol. 6, no. 1, Jan. 2008, pp. 32-46. https://doi.org/10.1016/j.adhoc.2006.07.005
- J. Dong, R. Curtmola, and C.N. Rotaru, "Secure High-Throughput Multicast Routing in Wireless Mesh Networks," IEEE Trans. Mobile Comput., vol. 10, no. 5, 2011, pp. 653-668. https://doi.org/10.1109/TMC.2010.194
- R. Curtmola and C.N. Rotaru, "BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-hop Wireless Networks," IEEE Trans. Mobile Comput., vol. 8, no. 4, 2009, pp. 445-459. https://doi.org/10.1109/TMC.2008.134
- A.M.A. Mo'men, H.S. Hamza, and I.A. Saroit, "New Attacks and Efficient Countermeasures for Multicast AODV," HONET, Cairo, Egypt, Dec. 19-21, 2010, pp. 51-57.
- A.M.A. Mo'men, H.S. Hamza, and I.A. Saroit, "A Survey on Security Enhanced Multicast Routing Protocols in Mobile Ad Hoc Networks," HONET, Cairo, Egypt, 2010, pp. 262-268.
- F. He, K. Hao, and H. Ma, "S-MAODV: A Trust Key Computing Based Secure Multicast Ad Hoc on Demand Vector Routing Protocol," IEEE ICCSIT, Chengdu, China, vol. 6, July 9-11, 2010, pp. 434-438.
- S. Roy et al., "Securing MAODV: Attacks and Countermeasures," IEEE SECON, Santa Clara, CA, USA, Sept. 2005, pp. 521-532.
- A.A. Mo'men, H.S. Hamza, and I.A. Saroit, "Secure Multicast Routing Protocols in Mobile Ad-Hoc Networks," Int. J. Commun. Syst., vol. 27, no. 11, Nov. 2014, pp. 2808-2831. https://doi.org/10.1002/dac.2508
- A.M. Pushpa and K. Kathiravan, "Secure Multicast Routing Protocol against Internal Attacks in Mobile Ad Hoc Networks," IEEE GCC, Doha, Qatar, Nov. 17-20, 2013, pp. 245-250.
- A.M. Pushpa and K. Kathiravan, "Resilient PUMA (Protocol for Unified Multicasting through Announcement) against Internal Attacks in Mobile Ad Hoc Networks," ICACCI, Mysore, India, Aug. 22-25, 2013, pp. 1906-1912.
- I. Khalil and S. Bagchi, "Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure," IEEE Trans. Mobile Comput., vol. 10, no. 8, Aug. 2011, pp. 1096-1112. https://doi.org/10.1109/TMC.2010.249
- E. Royer and C. Perkins, "Multicast Ad-Hoc on-Demand Distance Vector (MAODV) Routing," Internet Draft, July 2000.
- A.M. Pushpa and K. Kathiravan, "Intelligent Stealthy Attack on MAODV in Mobile Ad Hoc Networks," Int. Conf. Adv. Comput., Chennai, India, Dec. 17-19, 2014, pp.1-6.
- P. Mohapatra, C. Gui, and J. Li, "Group Communications in Mobile Ad Hoc Networks," Comput., vol. 37, no. 2, Feb. 2004, pp. 52-59. https://doi.org/10.1109/MC.2004.1266296
- H. Gossain et al., "Supporting MAC Layer Multicast in IEEE 802.11-Based MANETs: Issues and Solutions," IEEE Int. Conf. Local Comput. Netw., Tampa, FL, USA, Nov. 2004, pp. 172-179.
- S. Kumar, V.S. Raghavan, and J. Deng, "Medium Access Control Protocols for Ad Hoc Wireless Networks: A Survey," Ad Hoc Netw., vol. 4, no. 3, May 2006, pp. 326-358. https://doi.org/10.1016/j.adhoc.2004.10.001
- E.M. Royer, S.J. Lee, and C.E. Perkins, "The Effects of MAC Protocols on Ad Hoc Network Communication," IEEE WCNC, Chicago, IL, USA, vol. 2, 2000, pp. 543-548.
- Q. Chen et al., "Overhaul of IEEE 802.11 Modeling and Simulation in NS-2," MSWiM, Chania, Greece, 2007, pp. 159-168.
- L.K. Law, S.V. Krishnamurthy, and M. Faloutsos, "Understanding and Exploiting the Trade-Offs between Broadcasting and Multicasting in Mobile Ad Hoc Networks," IEEE Trans. Mobile Comput., vol. 6, no. 3, 2007, pp. 264-279. https://doi.org/10.1109/TMC.2007.43
-
F.S. Wattenberg et al., "Anomaly Detection in Network Traffic Based on Statistical Inference and
${\alpha}$ -Stable Modeling," IEEE Trans. Dependable Secure Comput., vol. 8, no. 4, July-Aug. 2011, pp. 494-509. https://doi.org/10.1109/TDSC.2011.14 - C. O'Reilly et al., "Anomaly Detection in Wireless Sensor Networks in a Non-stationary Environment," IEEE Commun. Surveys Tutorials, vol. 16, no. 3, 2014, pp. 1413-1432. https://doi.org/10.1109/SURV.2013.112813.00168
- S. Misra et al., "LAID: A Learning Automata-Based Scheme for Intrusion Detection in Wireless Sensor Networks," Security Commun. Netw., vol. 2, no. 2, 2009, pp. 105-115. https://doi.org/10.1002/sec.74
- F. Yu et al., "Automata-Based Symbolic String Analysis for Vulnerability Detection," Formal Methods Syst. Des., vol. 44, no. 1, Feb. 2014, pp. 44-70. https://doi.org/10.1007/s10703-013-0189-1
- F. Swiderskia and W. Snyder, "Threat Modeling (Microsoft Professionals)," Microsoft Press, 1st Edition, 2004, pp. 1-240.
- G. Bianchi, "Performance Analysis of the IEEE 802.11 Distributed Coordination Function," IEEE J. Sel. Areas Commun., vol. 18, no. 3, Mar. 2000, pp. 535-547. https://doi.org/10.1109/49.840210
- The Network Simulator-NS2. Accessed Oct. 1, 2015. http://www.isi.edu/nsnam/ns/
- Y. Zhu and J. Kunz, "MAODV Implementation for NS 2.26," Carleton University, Technical Report, SCE-04-01.
Cited by
- Prevention of Stealthy Attacks through Privacy Mechanism in Wireless Ad hoc Networks vol.10, pp.16, 2015, https://doi.org/10.17485/ijst/2017/v10i16/112054
- Stealthy attack detection in multi-channel multi-radio wireless networks vol.77, pp.14, 2018, https://doi.org/10.1007/s11042-018-5866-z
- Defending against Medium Access Control and Network Layer Misbehavior Attacks by Monitoring Nodes in MANET vol.12, pp.3, 2015, https://doi.org/10.3923/ajsr.2019.369.375