Asian Journal of Information Technology

Year: 2016
Volume: 15
Issue: 23
Page No. 4890 - 4899

Mitigating Cooperative Black Hole Attack by Dynamic Defense Intrusion Detection Scheme in Mobile Ad Hoc Network

Authors : T. Poongodi, M. Karthikeyan and D. Sumathi

References

Banerjee, S., 2008. Detection removal of cooperative black and gray hole attack in mobile ad-hoc networks. Proceedings of the World Congress on Engineering and Computer Science WCECS, October 22-24, 2008, RCC Institute of Information Technology, San Francisco, USA, ISBN: 978-988-98671-0-2,-pp: 22.

Boppana, R.V. and X. Su, 2011. On the effectiveness of monitoring for intrusion detection in mobile ad hoc networks. IEEE. Trans. Mob. Comput., 10: 1162-1174.
CrossRef  |  Direct Link  |  

Bu, S., F.R. Yu, X.P. Liu and H. Tang, 2011. Structural results for combined continuous user authentication and intrusion detection in high security mobile ad-hoc networks. IEEE. Trans. Wirel. Commun., 10: 3064-3073.
CrossRef  |  Direct Link  |  

Chang, J.M., P.C. Tsou, I. Woungang, H.C. Chao and C.F. Lai, 2015. Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Syst. J., 9: 65-75.
CrossRef  |  Direct Link  |  

Karlof, C. and D. Wagner, 2003. Secure routing in wireless sensor networks: Attacks and countermeasures. Ad Hoc Networks, 1: 293-315.
CrossRef  |  Direct Link  |  

Komninos, N., D. Vergados and C. Douligeris, 2007. Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5: 289-298.
CrossRef  |  

Li, T., M. Abdelhakim and J. Ren, 2014. N-Hop networks: A general framework for wireless systems. IEEE. Wirel. Commun., 21: 98-105.
CrossRef  |  Direct Link  |  

Liu, K., J. Deng, P.K. Varshney and K. Balakrishnan, 2007. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6: 536-550.
CrossRef  |  

Marti, S., T.J. Giuli, K. Lai and M. Baker, 2000. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 255-265.

Nadeem, A. and M.P. Howarth, 2014. An intrusion detection and adaptive response mechanism for MANETs. Ad Hoc Netw., 13: 368-380.
CrossRef  |  Direct Link  |  

Nakayama, H., S. Kurosawa, A. Jamalipour, Y. Nemoto and N. Kato, 2009. A dynamic anomaly detection scheme for AODV-based mobile ad hoc networks. IEEE Trans. Vehicular Technol., 58: 2471-2481.
CrossRef  |  

Sanchez, C.L., M.G. Fernandez, G.P. Teodoro and M.R. Carrion, 2015. A model of data forwarding in MANETs for lightweight detection of malicious packet dropping. Comput. Netw., 87: 44-58.
Direct Link  |  

Sanzgiri, K., D. LaFlamme, B. Dahill, B. Levine, C. Shields and E.M. Belding-Royer, 2005. Authenticated routing for ad hoc networks. IEEE J. Sel. Areas Commun., 23: 598-610.
CrossRef  |  

Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Comp. Commun., 34: 107-117.
CrossRef  |  Direct Link  |  

Tamilselvan, L. and V. Sankaranarayanan, 2008. Prevention of co-operative black hole attack in MANET. J. Networks, 3: 13-20.
CrossRef  |  Direct Link  |  

Wang, B., X. Chen and W. Chang, 2014. A light-weight trust-based QoS routing algorithm for ad hoc networks. Pervasive Mob. Comput., 13: 164-180.
Direct Link  |  

Wang, W., G. Zeng, J. Yao, H. Wang and D. Tang, 2012. Towards reliable self-clustering mobile ad hoc networks. Comput. Electr. Eng., 38: 551-562.
Direct Link  |  

Xia, H., J. Yu, C.L. Tian, Z.K. Pan and E. Sha, 2016. Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks. J. Netw. Comput. Appl., 62: 112-127.
Direct Link  |  

Xia, H., Z. Jia, X. Li, L. Ju and E.H.M. Sha, 2013. Trust prediction and trust-based source routing in mobile ad hoc networks. Ad Hoc Netw., 11: 2096-2114.
Direct Link  |  

Xiao, B., B. Yu and C. Gao, 2007. CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput., 67: 1218-1230.
CrossRef  |  Direct Link  |  

Xing, F. and W. Wang, 2010. On the survivability of wireless ad hoc networks with node misbehaviors and failures. IEEE. Trans. Dependable Secure Comput., 7: 284-299.
CrossRef  |  Direct Link  |  

Yu, Y., L. Guo, X. Wang and C. Liu, 2010. Routing security scheme based on reputation evaluation in hierarchical ad hoc networks. Comput. Netw., 54: 1460-1469.
Direct Link  |  

Zapata, M.G. and N. Asokan, 2002. Securing ad hoc routing protocols. Proceedings of the 1st ACM Workshop on Wireless Security, September 28, 2002, Atlanta, GA., USA., pp: 1-10.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved