Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
24
Page No.
10401 - 10405
A Secure Data Transmission Mechanism (SDTM) in MANET by Using AODV
Routing Protocol with IPsec Protocol and Preemption Control Algorithm
Authors :
Abdullah A. Alhaj
and
Nabeel Zanoon
References
Al-Shurman, M., S.M. Yoo and S. Park, 2004. Black hole attack in mobile ad hoc networks. Proceedings of the 42nd International Conference on Annual Southeast Regional, April 02-03, 2004, ACM, New York, USA., ISBN:1-58113-870-9, pp: 96-97.
Alhaj, A.A., 2014. Performance evaluation of Secure Data Transmission Mechanism (SDTM) for cloud outsourced data and Transmission Layer Security (TLS). Intl. J. Cloud Appl. Comput., 4: 45-49.
CrossRef | Direct Link | Djenouri, D., A. Derhab and N. Badache, 2006. Ad hoc networks routing protocols and mobility. Intl. Arab J. Inf. Technol., 3: 126-133.
Direct Link | Dokurer, S., Y.M. Erten and C.E. Acar, 2007. Performance analysis of ad-hoc networks under black hole attacks. Proceedings of the 2007 IEEE International Conference on SoutheastCon, March 22-25, 2007, IEEE, Richmond, Virginia, USA., pp: 148-153.
Issariyakul, T. and E. Hossain, 2011. Introduction to Network Simulator NS2. Springer, Germany.
John, N.P. and A. Thomas, 2012. Prevention and detection of black hole attack in AODV based mobile Ad-hoc networks-a review. Intl. J. Innovative Res. Dev., 1: 232-245.
Direct Link | Perkins, C., E. Royer and S. Das, 2003. RFC 3561 Ad hoc on-demand distance vector (AODV) routing. The Internet Society. http://www.citeulike.org/user/sergiocabrero/article/1840161.
Raju, G.V.S., G. Hernandez and Q. Zou, 2000. Quality of service routing in ad hoc networks. Proceedings of the 2000 IEEE International Conference on Wireless Communications and Networking (WCNC) Vol. 1, September 23-28, 2000, IEEE, Chicago, Illinois, pp: 263-265.
Sanzgiri, K., B. Dahill, B.N. Levine, C. Shields and E.M. Belding-Royer, 2002. A secure routing protocol for ad hoc networks. Proceedings of the 10th IEEE International Conference on Network Protocols, November 12-15, 2002, IEEE, Paris, France, pp: 78-87.
Shevtekar, A., K. Anantharam and N. Ansari, 2005. Low rate TCP denial-of-service attack detection at edge routers. IEEE Commun. Lett., 9: 363-365.
CrossRef | Waraich, K.K. and B. Singh, 2015. Performance analysis of AODV routing protocol with and without malicious attack in mobile adhoc networks. Intl. J. Adv. Sci. Technol., 82: 63-70.
Direct Link | Yih-Chun, H. and A. Perrig, 2004. A survey of secure wireless ad hoc routing. IEEE Secur. Privacy, 2: 28-39.
CrossRef |