Asian Journal of Information Technology
808 - 816
Banerjee, S., 2008. Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. Proceedings of the World Congress on Engineering and Computer Science, October 22-24, 2008, San Francisco, USA., pp: 1-6.
Bhargava, B., R. de Oliveira, Y. Zhang and N.C. Idika, 2009. Addressing collaborative attacks and defense in ad hoc wireless networks. Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops, June 22-26, 2009, Montreal, QC., Canada, pp: 447-450.
Chang, J.M., P.C. Tsou, I. Woungang, H.C. Chao and C.F. Lai, 2015. Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Syst. J., 9: 65-75.CrossRef | Direct Link |
Dureja, A. and V. Dahiya, 2014. Performance evaluation of collaborative attacks in MANET. Int. J. Comput. Sci. Mobile Comput., 3: 457-465.Direct Link |
Gong, T. and B. Bhargava, 2013. Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model. Secur. Commun. Networks, 6: 58-68.CrossRef | Direct Link |
Mathew, R.L. and P. Petchimuthu, 2013. Detecting selfish nodes in MANETs using collaborative watchdogs. Int. J. Adv. Res. Comput. Sci. Software Eng., 3: 37-41.Direct Link |
Nouri, M., S.A. Aghdam and S.A. Aghdam, 2011. Collaborative techniques for detecting wormhole attack in MANETs. Proceedings of the International Conference on Research and Innovation in Information Systems, November 23-24, 2011, Kuala Lumpur, Malaysia, pp: 1-6.
Patel, M. and S. Sharma, 2013. Detection of malicious attack in MANET a behavioral approach. Proceedings of the IEEE 3rd International Advance Computing Conference, February 22-23, 2013, IEEE, Ghaziabad, India, ISBN: 978-1-4673-4527-9, pp: 388-393.
Sen, J., M.G. Chandra, P. Balamuralidhar, S.G. Harihara and H. Reddy, 2007. A distributed protocol for detection of packet dropping attack in mobile ad hoc networks. Proceedings of the IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, May 14-17, 2007, Penang, Malaysia, pp: 75-80.
Singh, U.K., K. Phuleria, S. Sharma and D.N. Goswami, 2014. An analysis of security attacks found in mobile ad-hoc network. Int. J. Scient. Eng. Res., 5: 1586-1592.Direct Link |
Wang, W., B. Bhargava and M. Linderman, 2009. Defending against collaborative packet drop attacks on MANETs. Proceedings of the 2nd International Workshop on Dependable Network Computing and Mobile Systems, September 27-30, 2009, Niagara Falls, New York, USA., pp: 1-6.
Yu, C.W., T.K. Wu, R.H. Cheng and S.C. Chang, 2007. A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Network. In: Emerging Technologies in Knowledge Discovery and Data Mining, Washio, T., Z.H. Zhou, J.Z. Huang, X.H. Hu and J.Y. Li et al
. (Eds.). Springer, New York, USA., pp: 538-549.