1 |
K. Sohraby, D. Minoli, and T. Znati, Wireless Sensor Networks: Technology, Protocols, and Applications. Hoboken, NJ: John Wiley & Sons, 2007.
|
2 |
R. W. Anwar, M. Bakhtiari, A. Zainal, and K. N. Qureshi, "Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks," Jurnal Teknologi (Science & Engineering), vol. 78, no. 4-3, pp. 75-81, 2016.
|
3 |
C. John and C. Wahi, "Security analysis of routing protocols for wireless sensor networks," International Journal of Applied Engineering Research, vol. 11, no. 6, pp. 4235-4242, 2016.
|
4 |
H. Shafiei, A. Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.
DOI
|
5 |
A. Dhaka, A. Nandal, and R. S. Dhaka, "Gray and black hole attack identification using control packets in MANETs," Procedia Computer Science, vol. 54, pp. 83-91, 2015.
DOI
|
6 |
M. Y. Su, "Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems," Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.
DOI
|
7 |
V. Kumar and R. Kumar, "An adaptive approach for detection of blackhole attack in mobile Ad hoc network," Procedia Computer Science, vol. 48, pp. 472-479, 2015.
DOI
|
8 |
L. Sanchez-Casado, G. Macia-Fernandez, P. Garcia-Teodoro, and R. Magan-Carrion, "A model of data forwarding in MANETs for lightweight detection of malicious packet dropping," Computer Networks, vol. 87, pp. 44-58, 2015.
DOI
|
9 |
M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers & Electrical Engineering, vol. 40, no. 2, pp. 530-538, 2004.
DOI
|
10 |
K. Balakrishnan, J. Deng, and V. K. Varshney, "TWOACK: preventing selfishness in mobile ad hoc networks," in Proceedings of 2005 IEEE Wireless Communications and Networking Conference, New Orleans, LA, 2005, pp. 2137-2142.
|
11 |
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 536-550, 2007.
DOI
|
12 |
S. Madria and J. Yin, "SeRWA: a secure routing protocol against wormhole attacks in sensor networks," Ad Hoc Networks, vol. 7, no. 6, pp. 1051-1063, 2009.
DOI
|
13 |
V. Heydari and S. M. Yoo, "Lightweight acknowledgement-based method to detect misbehavior in MANETs," KSII Transactions on Internet And Information Systems, vol. 9, no. 12, pp. 5150-5169, 2015.
DOI
|
14 |
N. K. Sreelaja and G. A. Vijayalakshmi Pai, "Swarm intelligence based approach for sinkhole attack detection in wireless sensor networks," Applied Soft Computing, vol. 19, pp. 68-79, 2014.
DOI
|
15 |
R. K. Sundararajan and U. Arumugam, "Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor network," Journal of Sensors, vol. 2015, Article ID. 203814, 2015.
|
16 |
Q. Liu, J. Yin, V. C. Leung, and Z. Cai, "FADE: forwarding assessment based detection of collaborative grey hole attacks in WMNs," IEEE Transactions on Wireless Communications, vol. 12, no. 10, pp. 5124-5137, 2013.
DOI
|
17 |
M. Sathish, K. Arumugam, S. N. Pari, and V. S. Harikrishnan, "Detection of single and collaborative black hole attack in MANET," in Proceedings of International Conference on Wireless Communications, Signal Processing and Networking, Chennai, India, 2016, pp. 2040-2044.
|
18 |
The Network Simulator (NS2) [Online]. Available: http://www.isi.edu/nsnam/ns/.
|
19 |
MannaSim [Online]. Available http://www.mannasim.dcc.ufmg.br/index.htm.
|