|
References [1] CISCO Systems, "White Paper: Mobile Ad Hoc Networks for the Military," GDSG-APAC-MANET ver3.0, 2003. [2] J. Timonen, "A dynamic Tactical Command System Operation with an Ad Hoc Network", University of Turku Dep. Information Technology, 2011. [3] P. Pankajini, K. K. Gadnayak and N. Panda , "MANET Attacks and their Countermeasures: A Survey," International Journal of Computer Science and Mobile Computing, p. 319 – 330, 2013. [4] F. Abdel-Fattah, K. A. Farhan, F. H. Al-Tarawneh and F. AlTamimi, "Security Challenges and Attacks in Dynamic Mobile Ad Hoc Networks MANETs," Proceedings of IEEE Jordan International Joint Conference on Electrical Engineering and Information Technology, Amman, Jordan, pp. 28-33, 2019. [5] R. Sheikh, M. S. Chande and D. K. Mishra, "Security issues in MANET: A review," Proceedings of 7th International Conference on Wireless and Optical Communications Networks, Colombo, Sri Lanka, pp. 1-4, 2010. [6] I. Aad, J. P. Hubaux and E. W. Knightlyz, "Denial of Service Resilience in Ad Hoc Networks," Proceedings of ACM MobiCom 2004, Philadelphia, USA, pp. 202-215, 2004. [7] R. H. Jhaveri, S. J. Patel and D. C. Jinwala, "DoS attacks in mobile ad-hoc networks: a survey," Proceedings of IEEE 2nd International Conference on Advanced Computing & Communication Technologies, Rohtak, Haryana, pp. 535-541, 2012. [8] G. Sandhu and M. Dasgupta, "Impact of Blackhole Attack In MANET," Proceedings of International J. of Recent Trends in Engineering and Technology, Vol. 3, No. 2, New Delhi, India, 2010. [9] W. Wang, B. Bhargava and M. Linderman, "Defending against Collaborative Packet Drop Attacks on MANETs," International Workshop on Dependable Network Computing and Mobile Systems, pp. 1-6, 2009. [10] . A. Srivastava, D. Kumar and S. C. Gupta, "Geographic and Reactive Routing Protocols for MANET," Proceedings of IEEE European Modelling Symposium, pp. 590-594, Manchester, UK, 2013. [11] T. Larsson and N. Hedman, "Routing protocols in wireless ad-hoc networks : a simulation study," [Dissertation], 1998, Available: urn:nbn:se:ltu:diva-52142 [12] J. M. AChoi and Y. B. Ko, "A performance evaluation for ad hoc routing protocols in realistic military scenarios," Proceedings of the 9th International Conference on Cellular and Intelligent Communications, 2004. [13] N. Panda and B. K. Pattanayak, "Analysis of Blackhole Attack in AODV and DSR," International Journal of Electrical and Computer Engineering, vol. 8, pp. 3092-3102, 2018. [14] A. Mukhija, "Reactive Routing Protocol for Mobile Ad-Hoc Networks," Department of Mathematics Indian Institute of Technology, Delhi, 2001. [15] S. Shruthi, "Proactive routing protocols for a MANET - A review," Proceedings of International Conference onInternational Conference on IoT in Social, Mobile, Analytics and Cloud, Palladam, India, pp. 821-827, 2017. [16] K. Raheja and S. K. Maakar, "A Survey on Different Hybrid Routing Protocols of MANET," International Journal of Computer Science and Information Technologies, pp. 5512-5516, 2014. [17] D. Johnson, Y. Hu and D. Maltz, "The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4," RFC 4728, 2007. [18] C. W. Badenhop, "A Black Hole Attack Model for Reactive Ad-Hoc Protocols," Air Force Insistute of Technology, 2012. [19] F. H. Tseng, L. D. Chou and H. C. Chao, "A survey of black hole attacks in wireless mobile ad hoc networks," Proceedings of Human-centric Computing and Information Sciences, pp. 1-16, 2011. [20] S. Gurung and S. Chauhan, "A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability," Wireless Networks, vol. 26, pp.1981-2011, 2019. [21] S. L. Dhende, S. D. Shirbahadurkar, S. S. Musale and S. K. Galande, "A survey on black hole attack in mobile ad hoc networks," Proceedings of the 4th International Conference on Recent Advances in Information Technology, pp. 1-7, Dhanbad, India, 2018. [22] N. K. Gupta and K. Pandey, "Trust Based Ad-hoc On Demand Routing Protocol for MANET," Proceedings of the 6th International Conference on Contemporary Computing, pp. 225-231, Noida, India, 2013. [23] H. Khattak, Nizamuddin, F. Khurshid and N. u. Amin , "Preventing black and gray hole attacks in AODV using optimal path routing and hash," Proceedings of the 10th IEEE International Conference on Networking, Sensing and Control, pp. 645-648, Evry, 2013. [24] S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon and K. Nygard , "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks," Proceedings of 2003 International Conference on Wireless Networks, pp. 570-575 , Las Vegas, USA, 2003. [25] R. H. Jhaveri and N. M. Patel, "A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks," Wireless Networks, vol. 21, pp. pages2781–2798, 2015. [26] B. Yang, R. Yamamoto and Y. Tanaka, "Dempster-Shafer Evidence Theory Based Trust Management Strategy against Cooperative Black Hole Attacks and Gray Hole Attacks in MANETs," Proceedings of the 16th International Conference on Advanced Communication Technology, pp. 223-232, Pyeongchang, South Korea, 2014 [27] M. Mohanapriya and I. Krishnamurthi, "Modified DSR protocol for detection and removal of selective black hole attack in MANET," Computers and Electrical Engineering, vol. 40, pp. 530-538, Tamilnadu, India, 2014. [28] K. Dhanalakshmi, B. Kannapiran and A. Divya, "Enhancing Manet Security Using Hybrid Techniques in Key Generation Mechanism," Proceedings of International Conference on Electronics and Communication Systems, pp. 1-5, Coimbatore, India, 2014. [29] A. D. Patel and K. Chawda, "Dual Security Against Grayhole Attack in MANETs," Intelligent Computing, Communication and Devices, pp 33-37, New Delhi, India, 2014. [30] J. M. Chang, P. C. Tsou, I. Woungang, H. C. Chao and C. F. Lai, "Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach," IEEE Systems Journal, vol. 9, pp. 65-75, 2015. [31] N. Sharma and A. S. Bisen, "Detection As Well As Removal Of Black hole And Gray hole Attack In MANET," International Conference on Electrical, Electronics, and Optimization Techniques, pp. 3736-3739, Chennai, India, 2016. [32] A. Soysal, A. Krotov , A. Deepak and B. Herman, "NS-3 Network Simulator," [Online], 2018, Available: https://www.nsnam.org/.
|