Hybrid Approach for Detection and Prevention of Blackhole Attack in Mobile Adhoc Network
Abstract
Keywords
Full Text:
PDFReferences
Anuj Joshi, Pallavi and Poonam Singh, “Security Threats in Mobile Ad Hoc Network”, S-JPSET, ISSN : 2229-7111, Vol. 1, Issue 2, 125-129, (2010).
Yudhvir Singh, Yogesh Chaba; Detection and Prevention of Blackhole Attack in Mobile Ad Hoc Network; In proceeding of IEEE International Conference on Advance Computing Conference, IACC 2009; March 6-7, 2009; pp 2668-2672 (2009).
Issa Khalil, Saurabh Bagchi, Ness B. Shroff “MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks”, Ad Hoc Networks, Elsevier, Volume 6, Issue 3, May 2008, Pages 344-362 (2008).
Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon and Kendall Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”, Proceedings of the International Conference on Wireless Networks, Las Vegas, (2003).
Chang Wu Yu, Tung-Kuang Wu, Rei Heng Cheng, and Shun Chao Chang, “A Distributed and Cooperative Black Hole Node Detection and Elimination mechanism for Ad Hoc Networks”, PAKDD 2007 Workshops, Springer-Verlag Berlin Heidelberg, LNAI 4819, 2007, pp. 538–549.
Yanchao Zhang, Wei Liu, Wenjing Lou, Yuguang Fang, “Securing Mobile Ad Hoc Networks with Certificateless Public Keys”, IEEE Transactions on Dependable and Secure Computing, Vol. 3, No. 4, (2006).
Latha Tamilselvan, Dr. V Sankaranarayanan, “Prevention of Co-Operative Black Hole Attack In MANET”, Journal Of Networks, Vol. 3, No. 5, May 2008, pp-13-20 (2008).
Ningrinla Marchang, Raja Datta, “Collaborative techniques for intrusion detection in mobile ad-hoc networks”, Ad Hoc Networks, Elsevier, Volume 6, Issue 4, June 2008, Pages 508-523 (2008)
Hoang Lan Nguyen, “A study of different types of attacks on multicast in mobile ad hoc networks”, Ad Hoc Networks, Elsevier, Vol. 6, Issue 1, January 2006, Pages 32-46 (2006).
Yanchao Zhang, Wenjing Lou, and Yuguang Fang, “SIP: a secure incentive protocol against selfishness in mobile ad hoc networks”, IEEE Wireless Communications and Networking Conference (WCNC'04), Atlanta, Georgia, (2004).
Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini Marko Jahnke, Jens T¨olle, “Detecting Black Hole Attacks in Tactical MANETs using Topology Graphs”, Proc. of 3rd IEEE conference on Network Security, (2007).
A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, Y. Yesha, “Threshold-based intrusion detection in ad hoc networks and secure AODV” Ad Hoc Networks, Elsevier, Volume 6, 2008, Pages 578-599 (2008).
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.