Asian Journal of Information Technology

Year: 2014
Volume: 13
Issue: 2
Page No. 68 - 76

Performance Improvement of Security Attacks in Wireless Mobile Ad Hoc Networks

Authors : N. Kirubakaran and A. Kathirvel

References

Bajaj, L., M. Takai, R. Ahuja, K. Tang, R. Bagrodia and M. Gerla, 1999. GloMoSim: A scalable network simulation environment. Technical Report 990027, University of California.

Brown, T.X., J.E. James and A. Sethi, 2010. Jamming and sensing of encrypted wireless ad hoc networks. Technical Report CU-CS-1005-06, University of Colorado, Boulder, CO., USA., pp: 1-13.

Georgiadis, L., M.J. Neely and L. Tassiulas, 2006. Resource allocation and cross-layer control in wireless networks. Found. Trends Networking, 1: 1-144.
CrossRef  |  Direct Link  |  

IEEE, 1999. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE 802.11, August, 1999, Institute of Electrical and Electronics Engineers Inc., New York, USA.

IEEE, 1999. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications. IEEE 802.11, August, 1999, Institute of Electrical and Electronics Engineers Inc., New York, USA.

Jayasingh, B.B. and B. Swathi, 2010. A novel metric for detection of jellyfish reorder attack on Ad hoc network. BVICAM's Int. J. Inform. Technol., 2: 15-20.
Direct Link  |  

Jyoshna, G. and K.Y. Prasad, 2012. Removal of byzantine attacks in Ad hoc networks. Int. J. Adv. Res. Comput. Engin. Technol., 1: 272-276.
Direct Link  |  

Kathirvel, A. and R. Srinivasan, 2011. ETUS: An enhanced triple umpiring system for security and performance improvement of mobile Ad hoc networks. Int. J. Network Manage., 21: 341-359.
CrossRef  |  Direct Link  |  

Kathirvel, A. and R. Srinivasan, 2011. ETUS: Enhanced triple umpiring system for security and robustness of wireless mobile Ad hoc networks. Int. J. Commun. Networks Distrib. Syst., 7: 153-187.
CrossRef  |  Direct Link  |  

Megha, A. and Y.K. Jain, 2011. Grayhole attack and prevention in mobile Ad hoc network. Int. J. Comput. Appl., 27: 21-26.
CrossRef  |  Direct Link  |  

Rai, A.K. R.R. Tewari and S.K Upadhyay, 2010. Different types of attacks on integrated MANET-Internet communication. Int. J. Comput. Sci. Secur., 4: 265-274.
Direct Link  |  

Raj, P.N. and P.B. Swadas, 2009. DPRAODV: A dynamic learning system against blackhole attack in AODV based MANET. Int. J. Comput. Sci., 2: 54-59.
Direct Link  |  

Rani, L.S. and R.R. Sekhar, 2012. Detection and prevention of wormhole attack in stateless multicasting. In. J. Sci. Engin. Res., 3: 1-5.
Direct Link  |  

Soldo, F., A. Le and A. Markopoulou, 2011. Blacklisting recommendation system: Using spatio-temporal patterns to predict future attacks. IEEE J. Sel. Areas Commun., 29: 1423-1437.
CrossRef  |  Direct Link  |  

Tsou, P.C., J.M. Chang, Y.H. Lin, H.C. Chao and J.L. Chen, 2011. Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs. Proceedings of the 13th International Conference on Advanced Communication Technology, February 13-16, 2011, Seoul, Korea, pp: 755-760.

Yu, C.W., T.K. Wu, R.H. Cheng and S.C. Chang, 2007. A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Network. In: Emerging Technologies in Knowledge Discovery and Data Mining, Washio, T., Z.H. Zhou, J.Z. Huang, X.H. Hu and J.Y. Li et al. (Eds.). Springer, New York, USA., pp: 538-549.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved