1 |
Minho Jo, Longzhe Han, Dohoon Kim, and Hoh Peter In, "Selfish attacks and detection in cognitive radio ad-hoc networks," IEEE network, vol. 27, no. 3, pp. 46-50, May/June 2013.
DOI
|
2 |
Krontiris, Ioannis, Tassos Dimitriou, Thanassis Giannetsos, and Marios Mpasoukos, "Intrusion detection of sinkhole attacks in wireless sensor networks," in Proc. of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks (AlgoSensors 2007), pp. 150-161, July 2007.
|
3 |
Sundararajan, Ranjeeth Kumar, and Umamakeswari Arumugam, "Intrusion detection algorithm for mitigating sinkhole attack on LEACH protocol in wireless sensor network," Journal of Sensors, vol. 2015, pp. 1-12, Feb.2015.
|
4 |
Wazid, Mohammad, and Ashok Kumar Das, "A Secure Group-Based Blackhole Node Detection Scheme for Hierarchical Wireless Sensor Network," Wireless Personal Communications, vol. 94, issue 3, pp. 1165-1191, Sep. 2017.
DOI
|
5 |
Dong Xie, HaiPeng Peng, Lixiang Li, and Yixian Yang, "Efficient post-quantum secure network coding signatures in the standard model," KSII Transactions on Internet and Information Systems (TIIS) vol. 10, no. 5, pp. 2427-2445, May 2016.
DOI
|
6 |
Dong Xie, Haipeng Peng, Lixiang Li, and Yixian Yang, "An efficient privacy-preserving scheme for secure network coding based on compressed sensing," AEU-International Journal of Electronics and Communications, vol. 79, pp. 33-42, Sep. 2017.
DOI
|
7 |
Anwar, Raja Waseem, Majid Bakhtiari, Anazida Zainal, and Kashif Naseer Qureshi, "Wireless sensor network performance analysis and effect of blackhole and sinkhole attacks," Jurnal Teknologi (Science & Engineering), vol. 78, no., 4-3, pp. 75-81, 2016.
|
8 |
Dhaka, Arvind, Amita Nandal, and Raghuveer S. Dhaka, "Gray and Blackhole Attack Identification using Control Packets in MANETs," Procedia Computer Science 54 pp. 83-91, August, 2015.
DOI
|
9 |
Perkins, Charles, Elizabeth Belding-Royer, and Samir Das, "Ad hoc on-demand distance vector (AODV) routing," No.RFC 3561, 2003.
|
10 |
Shafiei, Hosein, Ahmad Khonsari, H. Derakhshi, and P. Mousavi, "Detection and mitigation of sinkhole attacks in wireless sensor networks" Journal of Computer and System Sciences, vol. 80, no. 3, pp. 644-653, 2014.
DOI
|
11 |
Ju Ren, Yaoxue Zhang, Kuan Zhang, Xuemin Shen., "Adaptive and Channel-Aware Detection of Selective Forwarding Attacks in Wireless Sensor networks," IEEE Transactions on Wireless Communications, vol. 15, no. 5, pp. 3718-3731, May 2016.
DOI
|
12 |
Umar, Idris Abubakar, Zurina Mohd Hanapi, Aduwati Sali, and Zuriati A. Zulkarnain, "FuGeF: a resource bound secure forwarding protocol for wireless sensor networks," Sensors, no. 16(6), pp. 943, 2016.
DOI
|
13 |
Umar, Idris Abubakar, Zurina Mohd Hanapi, Aduwati Sali, and Zuriati A. Zulkarnain, "Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks," IEEE Access, vol. 5, pp. 2550-2562, 2017.
DOI
|
14 |
Marti, Sergio, Thomas J. Giuli, Kevin Lai, and Mary Baker, "Mitigating routing misbehavior in mobile ad hoc networks" in Proc. of the 6th annual international conference on Mobile computing and networking, pp. 255-265. ACM, 2000.
|
15 |
Balakrishnan, Kashyap, Jing Deng, and V. K. Varshne., "TWOACK: Preventing Selfishness in Mobile Ad Hoc Networks," in Proc. of Wireless communications and networking conference, pp. 2137-2142, April, 2005.
|
16 |
Karuppiah, A. Babu, and S. Rajaram, "False Misbehavior Elimination of Packet Dropping Attackers during Military Surveillance using WSN," Advances in Military Technology, vol. 9, no.1, pp. 19-30 June 2014.
|
17 |
Kumar, Vimal, and Rakesh Kumar, "An Adaptive Approach for Detection of Blackhole Attack in Mobile Ad hoc Network" Procedia Computer Science, vol. 48, pp.472-479, 2015.
DOI
|
18 |
Altisen, Karine, Stephane Devismes, Raphael Jamet, and Pascal Lafourcade, "SR3: secure resilient reputation-based routing," Wireless Networks, vol. 23, no. 7, pp. 2111-2133, 2017.
DOI
|
19 |
Liu, Kejun, Jing Deng, Pramod K. Varshney, and Kashyap Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehaviour in MANETs," IEEE transactions on mobile computing, vol. 6, no. 5, pp. 536-550, May, 2007.
DOI
|
20 |
Shakshuki, Elhadi M., Nan Kang, and Tarek R. Sheltami, "EAACK - A secure Intrusion Detection System for MANETs," IEEE Transactions on Industrial Electronics, Vol. 60, Issue 3, pp. 1089-1098 March 2013.
DOI
|
21 |
Madria, Sanjay, and Jian Yin, "SeRWA: A secure routing protocol against wormhole attacks in sensor networks," Ad Hoc Networks, vol. 7, no. 6, pp. 1051-1063, 2009.
DOI
|
22 |
Bankovic, Z., Juan Carlos Vallejo, David Fraga, and Jose Manuel Moya, "Detecting bad-mouthing attacks on reputation systems using self-organizing maps," Computational Intelligence in Security for Information Systems, pp. 9-16. Springer, Berlin, Heidelberg, 2011.
|
23 |
http://www.mannasim.dcc.ufmg.br/index.htm
|
24 |
Chang, Jian-Ming, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao, and Chin-Feng Lai, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach" IEEE Systems Journal, vol. 9, no. 1, pp. 65-75, 2015.
DOI
|
25 |
NS2 web site, http://www.isi.edu/nsnam/ns/
|