Asian Journal of Information Technology
Year:
2016
Volume:
15
Issue:
22
Page No.
4431 - 4437
References
Al-Shurman, M., S.M. Yoo and S. Park, 2004. Black hole attack in mobile Ad Hoc networks. Proceedings of the 42nd Annual Southeast Regional Conference, April 2-3, 2004, Huntsville, AL. USA., pp: 96-97.
Das, R., B.S. Purkayastha and P. Das, 2012. Security measures for black hole attack in MANET: An approach. Preprint, 5: 338-340.
Direct Link | Dokurer, S., Y.M. Erten and C.E. Acar, 2007. Performance analysis of ad-hoc networks under black hole attacks. Proceedings of the IEEE Conference on Southeast, March 22-25, 2007, Richmond, VA., pp: 148-153.
Sanzgiri, K., B. Dahill, B.N. Levine, C. Shields and E.M.B. Royer, 2002. A secure routing protocol for ad hoc networks. Proceedings of the 10th International Conference on Network Protocols, November 12-15, 2002, Paris, France, pp: 78-87.
Shevtekar, A., K. Anantharam and N. Ansari, 2005. Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9: 363-365.
CrossRef | Wu, B., J. Chen, J. Wu and M. Cardei, 2007. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Network Security. Yang, X., X.S. Shen and Z.D. Ding (Eds.). Springer US, New York, USA., ISBN: 978-0-387-28040-0, pp: 103-135.
Yih-Chun, H. and A. Perrig, 2004. A survey of secure wireless ad hoc routing. IEEE Secur. Privacy, 2: 28-39.
CrossRef | Zapata, M.G. and N. Asokan, 2002. Securing ad hoc routing protocols. Proceedings of the 1st ACM Workshop on Wireless Security, September 28, 2002, Atlanta, GA., USA., pp: 1-10.