|
[1]H. Dei, W. Li and D. P. Agarwal, ”Routing Security in Wireless Ad Hoc Networks”, IEEE Communication magazine, Vol. 40, no.10, October 2002. [2]E. M. Royer, and C. Toh, ”A Review of Current Roting Protocols for Ad Hoc Mobile Wireless Networks”, IEEE Personal Communication, pp.46-55, 1999. [3]L. Abusalah, A. Khokhar, and M. Guizani, “A Survey of Secure Mobile Ad Hoc Routing Protocols”, IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 10, NO. 4, 2008 [4]T. Liu and K. Liu , “Improvements on DSDV in Mobile Ad Hoc Networks”, Wireless Communications, Networking and Mobile Computing, pp. 1637-1640, 2007. [5]P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, “Optimized link state routing protocol for ad hoc networks”, Multi Topic Conference, 2001. [6]P. Khatri, M. Rajput, A. Shastri and Keshav Solanki, “Performance Study of Ad-Hoc Reactive Routing Protocols”, Journal of Computer Science 6 (10): pp.1130-1134, 2010. [7]C. E. Perkins, E. M. Belding-Royer and S. R. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing”, IETF Internet Draft, Work in Progress, 2002. [8]D. B. Johnson, D. A. Maltz and J. Broch, "DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks", Ad hoc networking, chapter 5, pp. 139–172, 2001. [9]V. D. Park and M. S. Corson, “A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks,” Proc. IEEE INFOCOM ’97, pp.1405–1355, 1997. [10]Z. J. Haas , “A new routing protocol for the reconfigurable wireless networks”, Proceedings of 6th IEEE International Conference on Universal Personal Communications, Vol.2, pp. 562-566, 1997. [11]M. Joa-Ng and I. T. Lu, “A Peer-to Peer Zone-Based Two Level Link State Routing for Mobile Ad hoc Networks,” IEEE JSAC, vol. 17, no. 8, pp. 1415–25.55, 1999. [12]H. Deng ,W. Li and Agrawal, D.P, “Routing security in wireless ad hoc networks” , IEEE Communications Magazine, Vol.40, Issue:10, pp70-75, 2002. [13]M. Medadian,, M.H. Yektaie and A.M Rahmani, “Combat with Black Hole Attack in AODV routing protocol in MANET”, Internet, 2009. AH-ICI 2009. First Asian Himalayas International Conference on, 2009. [14]N. H. Mistry, D. C. Jinwala and M. A. Zaveri, “MOSAODV: Solution to Secure AODV against Blackhole Attack” , International Journal of Computer and Network Security, 2009. [15]L. Tamilselvan and Dr. V Sankaranarayanan, “Prevention of Blackhole Attack in MANET”, In Proceedings of The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, pp. 21-21, 2007. [16]P. N. Raj and P. B. Swadas, “DPRAODV: A DYANAMIC LEARNING SYSTEM AGAINST BLACKHOLE ATTACK IN AODV BASED MANET”, IJCSI International Journal of Computer Science Issues, Vol. 2, 2009 [17]S. Ramaswamy, H. Fu, M. Sreekantaradhya, J.Dixon and K. Nygard, “Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks”, In proceedings of the 2003 International Conference on Wireless Networks (ICWN’03), 2003. [18]H. Weerasinghe, and H. Fu, “Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation”, International Journal of Software Engineering and Its Applications (IJSEIA), Vol.2 No.3, 2008. [19]L. Tamilselvan and Dr. V Sankaranarayanan, “Prevention of Co-operative Black Hole Attack in MANET”, JOURNAL OF NETWORKS, VOL. 3, NO. 5, MAY 2008.
|