Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 22
Page No. 4431 - 4437

DSR Protocol Heirarchy for Detection of Blackhole Attacks

Authors : L. Tejeswini, K.V.D.K. Kirn, S. Satyanarayana and B.V. Eeramallu

References

Al-Shurman, M., S.M. Yoo and S. Park, 2004. Black hole attack in mobile Ad Hoc networks. Proceedings of the 42nd Annual Southeast Regional Conference, April 2-3, 2004, Huntsville, AL. USA., pp: 96-97.

Das, R., B.S. Purkayastha and P. Das, 2012. Security measures for black hole attack in MANET: An approach. Preprint, 5: 338-340.
Direct Link  |  

Dokurer, S., Y.M. Erten and C.E. Acar, 2007. Performance analysis of ad-hoc networks under black hole attacks. Proceedings of the IEEE Conference on Southeast, March 22-25, 2007, Richmond, VA., pp: 148-153.

Sanzgiri, K., B. Dahill, B.N. Levine, C. Shields and E.M.B. Royer, 2002. A secure routing protocol for ad hoc networks. Proceedings of the 10th International Conference on Network Protocols, November 12-15, 2002, Paris, France, pp: 78-87.

Shevtekar, A., K. Anantharam and N. Ansari, 2005. Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9: 363-365.
CrossRef  |  

Wu, B., J. Chen, J. Wu and M. Cardei, 2007. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Network Security. Yang, X., X.S. Shen and Z.D. Ding (Eds.). Springer US, New York, USA., ISBN: 978-0-387-28040-0, pp: 103-135.

Yih-Chun, H. and A. Perrig, 2004. A survey of secure wireless ad hoc routing. IEEE Secur. Privacy, 2: 28-39.
CrossRef  |  

Zapata, M.G. and N. Asokan, 2002. Securing ad hoc routing protocols. Proceedings of the 1st ACM Workshop on Wireless Security, September 28, 2002, Atlanta, GA., USA., pp: 1-10.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved