

An Effective Security Approach for MANET using Detection Algorithm
Abstract
Keywords
References
R.Sathya, Dr.P.Latha,” Provision of Security Using Detection Algorithm in MANET”, International Conference on Computing and Control Engineering, Dr.M.G.R University, Chennai, 2012.
C. Perkins, E. Royer and S. Das, “Ad hoc on-demand distance vector routing”, RFC-3651, (Jul. 2003).
M. G. Zapata and N. Asokan, “Securing Ad hoc Routing Protocol”. In the proceeding of 3rd ACM workshop on Wireless Security 2002, 1-10.
S. Marti, T. J. Giuli, K. Lai and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Network”. In the Proceedings of 6th annual conference on Mobile Computing and Networking 2000, 255-265.
X. Li, M. R. Lyu, J. Liu, “A Trust Model Based Routing Protocol for Secure Ad Hoc Networks”. In the Proceedings of IEEE Aerospace Conference (IEEEAC) 2004, 1286-1295
C. Perkins, “Ad Hoc Networks”, Addison-Wesley, 2001.
M. Zapata, “Secure Ad Hoc on-Demand Distance Vector (SAODV)”. Internet draft, draft-guerrero-manet-saodv-01.txt, 2002.
Y. Hu, A. Perrig, and D. Johnson, Ariadne: “A Secure On-Demand Routing for Ad Hoc Networks”. Proc. of MobiCom 2002, Atlanta, 2002.
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-demand Secure Routing Protocol Resilient to Byzantine Failures. Proceedings of the ACM Workshop on Wireless Security, pp. 21-30, 2002.
Y. Hu, A. Perrig, and D. Johnson, Packet Leashes: “A Defense against Wormhole Attacks inWireless Ad Hoc Networks.” Proc. of IEEE INFORCOM, 2002.
Leashes, G. Vigna, S. Gwalani, E. Belding-Royer, and R. Kemmerer, “A Defense against Wormhole Attacks in Wireless Networks,” in Proc. 20th ACSAC, Dec. 2004, pp. 16–27
Rashid Hafeez Khokhar, Md Asri Ngadi and Satria Mandala. “A Review of Current Routing Attacks in Mobile Ad hoc Networks”. International Journal of Computer Science and Security,2(3):18-29, 2008
Bingwen He, Joakim Hägglund and Qing GU. “Security in Adhoc Networks”, an essay produced for the course Secure Computer Systems HT2005 (1DT658), 2005 IEEE Std. 802.11. “Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY)Specifications”, 1997
Sun Choi, Doo-young Kim, Do-hyeon Lee and Jae-il Jung. “WAP: Wormhole Attack Prevention Algorithm In Mobile Ad Hoc Networks”, In Proceedings of International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, Vol. 0, ISBN = 978-0-7695-3158-8, pp. 343-348, 2008
Moumita Deb, “A Cooperative Black hole Node Detection Mechanism for ADHOC Networks”, Proceedings of the World Congress on Engineering and Computer Science, 2008
Dhaval Gada, Rajat Gogri, Punit Rathod, Zalak Dedhia, Nirali Mody, Sugata Sanyal and Ajith Abraham. “A Distributed Security Scheme for Ad Hoc Networks”, ACM Publications, Vol-11, Issue1, pp.5–5, 2004
Oscar F. Gonzalez, God win Ansa, Michael Howarth and George Pavlou. “Detection and Accusation of Packet Forwarding Misbehavior in Mobile Ad-Hoc networks”. Journal of Internet Engineering, 2:1, 2008
Satria Mandala, Md. Asri Ngadi, A.Hanan Abdullah. “A Survey on MANET Intrusion Detection” International Journal of Computer Science and Security, 2(1):1-11, 1999
Frank Kargl, Andreas Klenk, Stefan Schlott and Michael Weber. “Advanced Detection of Selfish or Malicious Nodes in Ad hoc Networks”, In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing, 2002
Murali Kodialam, T. V. Lakshman. “Detecting Network Intrusions via Sampling: A Game Theoretic Approach”, In Proceedings of IEEE INFOCOM, 2003
Patcha, A; Mishra, A. “Collaborative security architecture for black hole attack prevention in mobile ad hoc networks”, In Proceedings of Radio and Wireless conference, RAWCON apos; 03,Vol. 10, Issue 13, pp. 75–78, Aug 2003
N. Song, L. Qian and X. Li. “Wormhole attacks detection in wireless ad hoc networks: A statistical analysis approach”, In proceedings of 19th IEEE International Parallel and Distributed Processing Symposium, 2005
Nasser, N, Yunfeng Chen. “Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks”, In proceedings of IEEE International Conference on Communications, ICC apos; Vol-07 , Issue 24-28, pp.1154 – 1159, June 2007
S.Dhanalakshmi, Dr.M.Rajaram. “A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET”, IJCSNS International Journal of Computer Science and Network Security, 8(10), October 2008
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang and Mei-Chun Chou. “Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks”, In Proceedings of 22nd International Conference on Advanced Information Networking and Applications - Workshops, 2008, AINAW
March 2008 Yi, Ping Wu, Yue Li and Jianhua. “Malicious node detection in Ad Hoc networks using timed automata”, In Proceedings of IET Conference on Wireless, Mobile and Sensor Network (CCWMSN07), Shangai, China, 2007
Bharat Bhargava, Ruy de Oliveira, Yu Zhang and Nwokedi C. Idika. "Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks", In Proceedings of 29th IEEE International Conference on Distributed Computing Systems Workshops, pp. 447-450, 2009
Dan Pei, Lixia Zhang, Dan Massey, “A Framework for Resilient InternetRouting Protocols”, IEEE Network special issue on Protection, Restoration, and Disaster Recovery, April 2004
Sreekanth Malladi, Jim Alves-Foss, Robert B. Heckendorn, “OnPreventing Replay Attacks on Security Protocols”, Paper presented at the International Conference on Security and Management, 2002.
Johnson, D., “Routing in Ad Hoc Networks of Mobile Hosts,”Proc. of the Workshop on Mobile Computing Systems and Applications, Dec. 1994, pp. 158-163
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.