메뉴 건너뛰기




Volumn 3, Issue 5, 2008, Pages 13-20

Prevention of co-operative black hole attack in MANET

Author keywords

Ad hoc networks; AODV; Black hole attack; Fidelity level; Routing protocols

Indexed keywords

AD HOC NETWORKS; GRAVITATION; INTERNET PROTOCOLS; MOBILE SECURITY; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK ROUTING; NETWORK SECURITY; ROUTERS; ROUTING PROTOCOLS; STARS; WIRELESS AD HOC NETWORKS;

EID: 70449107969     PISSN: 17962056     EISSN: None     Source Type: Journal    
DOI: 10.4304/jnw.3.5.13-20     Document Type: Article
Times cited : (124)

References (20)
  • 1
    • 0036804761 scopus 로고    scopus 로고
    • Routing Security in Wireless Ad Hoc Networks, University of Cincinnati
    • October
    • Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communications magazine, Vol.40, no. 10, October 2002.
    • (2002) IEEE Communications magazine , vol.40 , Issue.10
    • Deng, H.1    Li, W.2    Agarwal, D.P.3
  • 4
    • 0033357103 scopus 로고    scopus 로고
    • Lidong zhou, Zygmunt J. Haas, Securing Ad Hoc Networks, IEEE network, special issue on network security, 13, no. 6, November/ December 1999.
    • Lidong zhou, Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE network, special issue on network security, Vol. 13, no. 6, November/ December 1999.
  • 5
    • 3042647758 scopus 로고    scopus 로고
    • Yi-Chun Hu, Adrian Perrig, A Survey of Secure Wireless Ad Hoc Routing, IEEE Security and Privacy, 1540-7993/04 /$20.00© 2004 IEEE, May/June 2004.
    • Yi-Chun Hu, Adrian Perrig, "A Survey of Secure Wireless Ad Hoc Routing", IEEE Security and Privacy, 1540-7993/04 /$20.00© 2004 IEEE, May/June 2004.
  • 6
    • 4143065848 scopus 로고    scopus 로고
    • Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Netwoks
    • Yih-Chun, Adrian Perrig, David B. Johnson, "Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Netwoks", sparrow.ece.cmu.edu /~adrian/ projects/secure-routing/ariadne.pdf, 2002.
    • (2002)
    • Yih-Chun, A.P.1    Johnson, D.B.2
  • 7
    • 78651524850 scopus 로고    scopus 로고
    • Mobile Ad Hoc Networking Working Group, Internet Draft, February
    • Charles E. Perkins, Elizabeth M. Belding-Royer, Samir R. Das, , Mobile Ad Hoc Networking Working Group, Internet Draft, February 2003.
    • (2003)
    • Perkins, C.E.1    Belding-Royer, E.M.2    Das, S.R.3
  • 8
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Available on
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM), pages 255-265, 2000. Available on: citeseer.ist.psu.edu/marti00mitigating.html.
    • (2000) In mobile Computing and Networking (MOBICOM) , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 9
    • 21644475986 scopus 로고    scopus 로고
    • A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do
    • Technical Report IC/2003/72, EPFL-DI-ICA, November, Available
    • S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A test-bed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on:citeseer.ist.psu.edu/645200.html.
    • (2003)
    • Buchegger, S.1    Tissieres, C.2    Le Boudec, J.Y.3
  • 10
    • 15344340908 scopus 로고    scopus 로고
    • A robust reputation system for mobile adhoc networks
    • Technical Report IC/2003/50, EPFL-DI-ICA, July
    • S. Buchegger and J. Y. Le Boudec. A robust reputation system for mobile adhoc networks. Technical Report IC/2003/50, EPFL-DI-ICA, July 2003.
    • (2003)
    • Buchegger, S.1    Le Boudec, J.Y.2
  • 11
    • 71849087703 scopus 로고    scopus 로고
    • Preventing denial of service and selfishness in adhoc networks
    • Lausanne, Switzerland, June
    • P. Michiardi and R. Molva. Preventing denial of service and selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.
    • (2002) Working Session on Security in Ad Hoc Networks
    • Michiardi, P.1    Molva, R.2
  • 12
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portorosz, Slovenia, September
    • P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, pages 107-121, Portorosz, Slovenia, September 2002.
    • (2002) Proceedings of The 6th IFIP Communications and Multimedia Security Conference , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 15
    • 0043097428 scopus 로고    scopus 로고
    • Routing Protocols in Wireless Ad-hoc Networks- A Simulation Study
    • Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm
    • Tony Larsson, Nicklas Hedman, "Routing Protocols in Wireless Ad-hoc Networks- A Simulation Study", Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm, 1998.
    • (1998)
    • Larsson, T.1    Hedman, N.2
  • 16
    • 78651533549 scopus 로고    scopus 로고
    • Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks, WIRELESS/MOBILE NETWORK SECURITY, 2006 Springer.
    • Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", WIRELESS/MOBILE NETWORK SECURITY, 2006 Springer.
  • 17
    • 78651572321 scopus 로고    scopus 로고
    • C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks-Architectures and Protocols, Pearson Education, 2007.
    • C.Siva Ram Murthy and B.S.Manoj," Ad hoc Wireless Networks-Architectures and Protocols", Pearson Education, 2007.
  • 20
    • 51949111850 scopus 로고    scopus 로고
    • A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition. Asian
    • Chen Hongsong, Ji Zhenzhou and Hu Mingzeng, "A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition". Asian Journal of Information Technology, 5 (1): 54-60, 2006.
    • (2006) Journal of Information Technology , vol.5 , Issue.1 , pp. 54-60
    • Chen, H.1    Zhenzhou, J.2    Hu, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.