Intrusion Detection for Black Hole and Gray Hole in MANETs |
She, Chundong
(School of Electronic Engineering, Beijing University of Posts and Telecommunications)
Yi, Ping (School of Information Security Engineering, Shanghai Jiao Tong University) Wang, Junfeng (College of Computer Science, Sichuan University) Yang, Hongshen (Department of Electrical Engineering, Tongling University) |
1 | Deng, H., Li, W., & Agrawal, D., "Routing Security in Wireless Ah Hoc Networks," IEEE Communications Magazine, Vol.40, No.10, pp.70 - 75, 2002. |
2 | H.Nishiyama, T.Ngo, N. Ansari, N.Kato, "On Minimizing the Impact of Mobility on Topology Control in Mobile Ad Hoc Networks," IEEE Transactions on Wireless Communications, Vol.11, No.3, pp. 1158 - 1166, 2012. DOI ScienceOn |
3 | Yingbin Liang, Poor, H.V., Lei Ying, "Secrecy Throughput of MANETs Under Passive and Active Attacks," IEEE Transactions on Information Theory, Vol.57, No.10, pp. 6692 - 6702, 2011. |
4 | Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu, "Risk-Aware Mitigation for MANET Routing Attacks," IEEE Transactions on Dependable and Secure Computing, Vol.9, No.2, pp. 250 - 260, 2012. DOI ScienceOn |
5 | Johnson DB, Maltz DA, Broch J., "DSR: The dynamic source routing protocol for multiple wireless ad hoc networks," Ad Hoc Networking. Addison-Wesley, pp.139-172, 2001. |
6 | Cai, J.W., Yi, P., Tian, Y., Zhou Y.K., Liu N., "The Simulation and Comparison of Routing Attacks on DSR Protocol," in Proc. of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009 (WiCom '09), Beijing, China, September, 2009. |
7 | Bo Sun; Yong Guan, Jian Chen, Pooch U.W., "Detecting Black-hole Attack in Mobile Ad Hoc Networks," in Proc. of 5th European Personal Mobile Communications Conference, pp.490-495, 2003. |
8 | Shila, D.M., Anjali, T., "Defending selective forwarding attacks in WMNs," in Proc. of IEEE International Conference on Electro/Information Technology, pp.96-101, 2008. |
9 | Patcha, A., Mishra, A., "Collaborative security architecture for black hole attack prevention in mobile ad hoc networks," Radio and Wireless Conference, pp.75-78, 2003. |
10 | Gao Xiaopeng, Chen Wei, "A Novel Gray Hole Attack Detection Scheme for Mobile Ad-Hoc Networks," in Proc. of IFIP International Conference on Network and Parallel Computing Workshops, pp.209-214, 2007. |
11 | D. Boneh, C. Gentry, B. Lynn, H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," Advances in Cryptology-EUROCRYPT'03: LNCS 2656. Berlin: Springer-Veralg, pp.416-432, 2003. |
12 | Akyildiz, I. F., & Wang, X., "A Survey on Wireless Mesh Networks," IEEE Communications Magazine, Vol.43, No. 9, pp.23-30, 2005. DOI ScienceOn |
13 | D.S J De Couto, D.Aguayo, J.Bicket, and R.Morris, "A High-Throughput Path Metric for Multi-Hop Wireless routing," in Proc. of ACM International Conference on Mobile Computing and Networking (ACM Mobicom2003), 2003. |
14 | M. Just, E. Kranakis, and T. Wan, "Resisting Malicious Packet Dropping In Wireless Ad Hoc Networks," International Conference on Ad Hoc Networks and Wireless (ADHOC-NOW2003), Oct. 2003. |
15 | Kevin Fall and Kannan Varadhan, NS notes and documentation, The VINT Project, UC Berkely, LBL, USC/ISI, and Xerox PARC, 1997. |
16 | J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. of ACM International Conference on Mobile Computing and Networking (ACM Mobicom1998), 1998. |