1 |
Latha Tamilselvan, V sankaranarayanan, "Prevention of Blackhole Attack in MANET". In Proceedings of The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, pp.21-21, 2007.
|
2 |
W. Wang, Y. Lu, and B. K. Bhargava, "On vulnerability and protection of ad hoc on-demand distance vector protocol," in The 10th International Conference on Telecommunications, Vol. 1, pp.375-382, 2003.
|
3 |
B. Wu et al., "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless/Mobile Network Security, Springer, vol. 17, 2006.
|
4 |
S. Lu, L. Li, K.Y. Lam, L. Jia, "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.," International Conference on Computational Intelligence and Security, 2009.
|
5 |
Y-C Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Sec. and Privacy, May-June 2004.
|
6 |
M. Abolhasan, T. Wysocki, E. Dutkiewicz, "A Review of Routing Protocols for Mobile Ad-Hoc Networks," Telecommunication and Infromation Research Institute University of Wollongong, Australia, June, 2003.
|
7 |
H. Deng, W. Li and D. P. Agrawal, "Routing Security in Wireless Ad-Hoc Networks," University of Cincinnati, IEEE Communication Magzine, Oct, 2002.
|