Averting Grey Hole Attacks Using Secure Data Protocol in Mobile Ad-Hoc Networks
Abstract
Full Text:
PDFReferences
Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A secure on-demand routing protocol for ad-hoc networks,” In Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, ACM Atlanta, GA, September 2002.
P. Papadimitratos, and Z. Haas, “Secure routing for mobile ad hec networks,” In Proceedings of SCS Communications Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 2002.
K. Snazgiri, B. Dahill, B. Levine, C. Shields, and E.A. Belding-Royer, “Secure routing protocol for ad hoc networks,” In Proceedings of International Conference on Network Protocols (ICNP), Paris, France, November 2002.
L. Zhou, and Z. Haas, “Securing ad hoc network,” IEEE Network Magazine, Special issue on network security, Vol. 13, No. 6, November/December 1999, pp. 24-30.
L. Buttyan, and J. Hubaux, “Enforcing cooperation in self-organizing mobile as hoc networks,” In Proceedings of IEEE/ACM Workshop on Mobile Ads Hoc Networks, Technical report DSC/2001/046, EPFL-DIICA, August 2002.
S. Marti, T. Guili, K. Lai, and M. Baker, “Mitigating routing misbehaviour in mobile ad hoc networks,” In Proceedings of MOBICOM 2000, pp. 255-265, 2000.
M. Jackobsson, J. Hubaux, and L. Buttyan, “A micro-payment scheme encouraging collaboration in multi-hop cellular networks,” In Proceedings of Financial Crypto 2003.
H. Yang, J. Shu, X. Meng, and S. Lu, “SCAN: Self-organized network layer security in mobile ad hoc networks,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
DOI: https://doi.org/10.23956/ijarcsse/V7I6/01622
Refbacks
- There are currently no refbacks.