메뉴 건너뛰기




Volumn , Issue , 2005, Pages 595-602

Simulation study of multiple black holes attack on mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

BLACK HOLE ATTACKS; BLACK HOLES; DYNAMIC TOPOLOGIES; EXTENSIVE SIMULATIONS; LOW MOBILITIES; MALICIOUS NODES; NETWORK THROUGHPUTS; SECURE AD-HOC NETWORKS; SECURE ROUTING PROTOCOLS; SECURITY ATTACKS; SECURITY DESIGNS; SIMULATION STUDIES; SPARSE NETWORKS;

EID: 60749130292     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (16)
  • 1
    • 0032621035 scopus 로고    scopus 로고
    • A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
    • April
    • E. M. Royer and C. K. Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, pp. 46-55, April 1999.
    • (1999) IEEE Personal Communications , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 3
    • 0036804761 scopus 로고    scopus 로고
    • Routing Security in Wireless Ad Hoc Network
    • October
    • H. Deng, W. Li, and D. P. Agrawal, "Routing Security in Wireless Ad Hoc Network," IEEE Communications Magazine, vol. 40, no. 10, October 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10
    • Deng, H.1    Li, W.2    Agrawal, D.P.3
  • 5
    • 78349285372 scopus 로고    scopus 로고
    • Glomosim, http://pcl.cs.ucla.edu/projects/glomosim/
    • Glomosim
  • 6
    • 0036638646 scopus 로고    scopus 로고
    • Scalable Routing Protocols for Mobile Ad Hoc Networks
    • July/August
    • X. Hong, K. Xu, and M. Gerla, "Scalable Routing Protocols for Mobile Ad Hoc Networks," IEEE Network Magazine, July/August, 2002, pp. 11-21.
    • (2002) IEEE Network Magazine , pp. 11-21
    • Hong, X.1    Xu, K.2    Gerla, M.3
  • 7
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • November/December
    • L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, November/December 1999.
    • (1999) IEEE Network Magazine , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2
  • 9
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad Hoc Wireless Networks
    • edited by Tomasz Imielinski and Hank Korth, Chapter 5, pp, Kluwer Academic Publishers
    • D. B. Johnson and D A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pp 153-181, Kluwer Academic Publishers, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 10
    • 1842815887 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc Networks: Challenges and Solutions
    • February
    • H.Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, Vol. 11, No. 1, pp. 38-47, February 2004.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 12
    • 1642307979 scopus 로고    scopus 로고
    • Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
    • Las Vegas, NV, USA, June
    • S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks," ICWN'03, Las Vegas, NV, USA, June 2003.
    • (2003) ICWN'03
    • Ramaswamy, S.1    Fu, H.2    Sreekantaradhya, M.3    Dixon, J.4    Nygard, K.5
  • 14
    • 60749137326 scopus 로고    scopus 로고
    • S. Capkuny, L. Butty'an, and J. P. Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, Technical Report at EPFL.
    • S. Capkuny, L. Butty'an, and J. P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," Technical Report at EPFL.
  • 15
    • 0011256357 scopus 로고    scopus 로고
    • Routing Security in Ad Hoc Networks,
    • Technical Report, Helsinki University of Technology
    • J. Lundberg, "Routing Security in Ad Hoc Networks," Technical Report, Helsinki University of Technology, 2000.
    • (2000)
    • Lundberg, J.1
  • 16
    • 60749135199 scopus 로고    scopus 로고
    • M. Just, E. Kranakis, and T. Wan, Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks, In proceedings of 2nd Annual Conference on Ad hoc Networks and Wireless, Montreal, Canada, Oct. 2003.
    • M. Just, E. Kranakis, and T. Wan, "Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks," In proceedings of 2nd Annual Conference on Ad hoc Networks and Wireless, Montreal, Canada, Oct. 2003.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.