메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Combat with black hole attack in AODV routing protocol in MANET

Author keywords

Ad hoc networks; AODV; Black hole attack; Routing protocols

Indexed keywords

AD HOC ON DEMAND DISTANCE VECTOR; AODV; AODV PROTOCOLS; AODV ROUTING PROTOCOL; AUTONOMOUS NETWORKS; BLACK HOLE ATTACK; BLACK HOLES; DESTINATION NODES; MALICIOUS NODES; MOBILE NODES; NEIGHBORING NODES; NETWORK FUNCTIONALITY; PACKET DELIVERY; SHORTEST PATH; WIRELESS LINK;

EID: 71849093792     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AHICI.2009.5340351     Document Type: Conference Paper
Times cited : (31)

References (20)
  • 1
    • 0036804761 scopus 로고    scopus 로고
    • Routing Security in Wireless Ad Hoc Networks, University of Cincinnati
    • October
    • Hongmei Deng, Wei Li, and Dharma P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", University of Cincinnati, IEEE Communication magazine,Vol.40, no.10, October 2002.
    • (2002) IEEE Communication magazine , vol.40 , Issue.10
    • Deng, H.1    Li, W.2    Agarwal, D.P.3
  • 4
    • 0033357103 scopus 로고    scopus 로고
    • Lidong zhou, Zygmunt J. Haas, Securing Ad Hoc Networks, IEEE network, special issue on network security, 13, no.6, November/December 1999.
    • Lidong zhou, Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE network, special issue on network security, Vol.13, no.6, November/December 1999.
  • 6
    • 4143065848 scopus 로고    scopus 로고
    • Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks
    • Yih-Chun, Adrian Perrig, David B. Johnson, "Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks",sparrow.ece.cmu.edu/ ~adrian/projects/securerouting/ariadne.pdf, 2002.
    • (2002)
    • Yih-Chun, A.P.1    Johnson, D.B.2
  • 7
    • 71849086738 scopus 로고    scopus 로고
    • Mobile Ad Hoc Networking Working Group, Internet Draft, February
    • Charles E. Perkins, Elizabeth M. Belding-Royer, Samir R.Das, , Mobile Ad Hoc Networking Working Group, Internet Draft, February 2003.
    • (2003)
    • Perkins, C.E.1    Belding-Royer, E.M.2    Das, S.R.3
  • 8
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Available on
    • S. Marti, T. J. Giuli, K. Lai, and M. Baker Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM), pages 255-265,2000. Available on: citeseer.ist.psu.edu/ marti00mitigating.html.
    • (2000) In mobile Computing and Networking (MOBICOM) , pp. 255-265
    • Marti, S.1    Giuli, T.J.2    Lai, K.3    Baker, M.4
  • 9
    • 21644475986 scopus 로고    scopus 로고
    • A testbed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do
    • Technical Report IC/2003/72, EPFL-DI-ICA, November, Available on
    • S. Buchegger, C. Tissieres, and J. Y. Le Boudec. A testbed for misbehavior detection in mobile ad-hoc networks - how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA, November 2003. Available on: citeseer.ist.psu.edu/645200.html.
    • (2003)
    • Buchegger, S.1    Tissieres, C.2    Le Boudec, J.Y.3
  • 10
    • 15344340908 scopus 로고    scopus 로고
    • A robust reputation system for mobile adhoc networks
    • Technical Report IC/2003/50, EPFL-DI-ICA, July
    • S. Buchegger and J. Y. Le Boudec. A robust reputation system for mobile adhoc networks. Technical Report IC/2003/50, EPFL-DI-ICA, July 2003.
    • (2003)
    • Buchegger, S.1    Le Boudec, J.Y.2
  • 11
    • 71849087703 scopus 로고    scopus 로고
    • Preventing denial of service and selfishness in adhoc networks
    • Lausanne, Switzerland, June
    • P. Michiardi and R. Molva. Preventing denial of service and selfishness in adhoc networks. In Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland, June 2002.
    • (2002) Working Session on Security in Ad Hoc Networks
    • Michiardi, P.1    Molva, R.2
  • 12
    • 85113133621 scopus 로고    scopus 로고
    • Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
    • Portorosz, Slovenia, September
    • P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, pages 107-121, Portorosz, Slovenia, September 2002.
    • (2002) Proceedings of The 6th IFIP Communications and Multimedia Security Conference , pp. 107-121
    • Michiardi, P.1    Molva, R.2
  • 15
    • 0043097428 scopus 로고    scopus 로고
    • Routing Protocols in Wireless Ad-hoc Networks- A Simulation Study
    • Masters thesis in computer science and engineering, Lulia University of Technology, Stokholm
    • Tony Larsson, Nicklas Hedman, "Routing Protocols in Wireless Ad-hoc Networks- A Simulation Study", Masters thesis in computer science and engineering, Lulia University of Technology, Stokholm, 1998.
    • (1998)
    • Larsson, T.1    Hedman, N.2
  • 16
    • 36849010124 scopus 로고    scopus 로고
    • A Survey on Attacks and Countermeasures in Mobile Ad Hoc Network
    • Springer
    • Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Network",WIRELESS MOBILE NETWORK SECURITY, 2006 Springer.
    • (2006) WIRELESS MOBILE NETWORK SECURITY
    • Wu, B.1    Chen, J.2    Wu, J.3    Cardei, M.4
  • 17
    • 71849106262 scopus 로고    scopus 로고
    • C.Siva Ram Murthy and B.S.Manoj, Ad hoc Wireless Networks-Architectures and Protocols, Pearson Education, 2007.
    • C.Siva Ram Murthy and B.S.Manoj," Ad hoc Wireless Networks-Architectures and Protocols", Pearson Education, 2007.
  • 20
    • 51949111850 scopus 로고    scopus 로고
    • A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition. Asian
    • Chen Hongsong, Ji Zhenzhou and Hu Mingzeng, "A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition". Asian Journal of Information Technology, 5 (1):54-60, 2006.
    • (2006) Journal of Information Technology , vol.5 , Issue.1 , pp. 54-60
    • Chen, H.1    Zhenzhou, J.2    Hu, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.