메뉴 건너뛰기




Volumn 6, Issue 2, 2012, Pages 179-184

An efficient black hole detection method using an encrypted verification message in mobile Ad Hoc networks

Author keywords

AODV; Black hole attack; Decryption; Encryption; MANET

Indexed keywords

AODV; BLACK HOLE ATTACK; BLACK HOLES; CONTROL OVERHEAD; DECRYPTION; MANET; VERIFICATION METHOD;

EID: 84864744982     PISSN: 17389976     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (5)

References (8)
  • 1
  • 2
    • 33751413873 scopus 로고    scopus 로고
    • Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks
    • Y. -C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks". In: Proc. of IEEE INFOCOM (2002).
    • (2002) Proc. of IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 3
    • 0742292815 scopus 로고    scopus 로고
    • Ad-hoc On demand Distance Vector (AODV) Routing Protocol
    • C. E. Perkins, E. M. Royer and S. Das, "Ad-hoc On demand Distance Vector (AODV) Routing Protocol". In: RFC, pp. 3561, (2003).
    • (2003) RFC , pp. 3561
    • Perkins, C.E.1    Royer, E.M.2    Das, S.3
  • 5
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", In: MOBICOM, pp. 255-265, (2000).
    • (2000) MOBICOM , pp. 255-265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 8
    • 84864743311 scopus 로고    scopus 로고
    • NS-2
    • NS-2, http://www.isi.edu/nsnam/ns/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.