An Overview of Security in MANET
Abstract
Full Text:
PDFReferences
K. Biswas and Md. Liaqat Ali, “Security threats in Mobile Ad-Hoc Network”, Master Thesis, Blekinge Institute of Technology” Sweden, 22nd March 2007
G. A. Pegueno and J. R. Rivera, “Extension to MAC 802.11 for performance Improvement in MANET”, Karlstads University, Sweden, December 2006
S. Lu, L. Li, K.Y. Lam, L. Jia, “SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack.,” International Conference on Computational Intelligence and Security, 2009.
P.V.Jani, “Security within Ad-Hoc Networks,” Position Paper, PAMPAS Workshop, Sept. 16/17 2002.
M.Parsons and P.Ebinger, “Performance Evaluation of the Impact of Attacks on mobile Ad-Hoc networks”
D.B.Roy, R.Chaki and N.Chaki, “A New Cluster-Based Wormhole Intrusion Detection Algorithm for Mobile Ad-Hoc Neworks”, International Journal of Network Security and Its Application (IJNSA), Vol. 1, No.1, April, 2009.
N.Shanti, Lganesan and K.Ramar, “Study of Different Attacks On Multicast Mobile Ad-HocNetwork”.
C.Wei, L.Xiang, B.yuebin and G.Xiaopeng, “A New Solution for Resisting Gray Hole Attack in Mobile Ad-Hoc Networks”, Second International Conference on Communications and Networking in china, pp.366-370, Aug, 2007.
Y. Hu, A. Perrig and D. Johnson, Packet Leashes: A Defense against Wormhole Attacksin Wireless Ad Hoc Networks, in Proceedings of IEEE INFOCOM’03, 2003.
Y. Hu, A. Perrig and D. Johnson, Wormhole Attacks in Wireless Networks, IEEEJournal on Selected Areas in Communications, Vol. 24, No. 2, February 2006.
Y. Hu, A. Perrig and D. Johnson, Rushing Attacks and Defense in Wireless Ad HocNetwork Routing Protocols, in Proceedings of ACM MobiCom Workshop - WiSe’03,2003.
Sergio Marti, T. J. Giuli, Kevin Lai and Mary Baker, Mitigating routing misbehavior inmobile ad hoc networks, in Proceedings of the 6th annual international conference on Mobilecomputing and networking (MobiCom’00),pages 255–265, Boston, MA, 2000.
Jim Parker, Discussion Record for the 1st MANET Reading Group Meeting,http://logos.cs.umbc.edu/wiki/eb/index.php/February_10%2C_2006 (Authorizationrequired).
Wenjia Li and Anupam Joshi, “Security Issues in Mobile Ad Hoc Networks - A Survey”.
Sukla Banerjee, “Detection/Removal of Cooperative Black and Gray Hole Attack in Mobile Ad-Hoc Networks”, Proceedings of the World Congress on Engineering and Computer Science 2008 WCECS 2008, October 22 - 24, 2008, San Francisco, USA.
Ujwala D. Khartad& R. K. Krishna, “Route Request Flooding Attack Using Trust based Security Scheme in Manet”, International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248‐9738 Volume‐1, Issue‐4, 2012
FahadSamad, Qassen Abu Ahmed, AsadullahShaikh and Abdul Aziz, “JAM: Mitigating Jellyfish Attack in Wireless Ad hoc Networks”,B.S. Chowdhary et.al.(Eds.):IMTIC 2012,CCIS 281,PP, 432-144.2012.
M.T.Refaei, V.Srivastava, L.Dasilva, M.Eltoweissy, “A Reputation-Based Mechanism for Isolating Selfish nodes in Ad-Hoc Networks,” Second Annual International Conference on Mobile and Ubiquitous Systems, Networking and Services, pp.3-11, July, 2005.
H.L.Nguyen,U.T.Nguyen, “Study of Different Types of Attacks on Multicast in Mobile Ad-Hoc Networks,” International Conference on Networking, Systems, Mobile Communications and Learning Technologies, Apr,2006.
S.Marti, T.J.Giuli, K.Lai, M.Baker, “Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks”.
Y. Hu, D. Johnson, and A. Perrig, SEAD: Secure Efficient Distance Vector Routing in Mobile Wireless Ad-Hoc Networks. Proc. of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’02), pp. 3-13,2002.
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, A Secure Routing Protocol for Ad Hoc Networks. Proc. of IEE -E International Conference on Network Protocols (ICNP), pp. 78-87, 2002.
DOI: https://doi.org/10.23956/ijarcsse/V7I6/0254
Refbacks
- There are currently no refbacks.