|
[1]Guo Chengyu, "The design and implementation of data transmission module for NS2 simulator,,"Proceedings of the Chung hua university,pp.1-76,February,2010. [2]Ramanathan, R. and Redi, J., "A Brief Overview of AD Hoc Networks:Challenges And Directions, "Proceedings of the IEEE communication Magazine 50th Anniversary Commemorative Issue, pp. 20-22, May, 2002. [3]https://zh.wikipedia.org/wiki/%E9%9A%A8%E5%BB%BA%E5%8D%B3%E9%80%A3%E7%B6%B2%E8%B7%AF [4]L.Zhou and Z.J. Haas, "Securing ad hoc networks, " Proceedings of the IEEE Network, vol.13,no.6, pp.24-30.1999. [5]H.Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks,," Proceedings of the IEEE Communications magazine, vol.40, no.10, pp.70-75. Oct,2002. [6]Zhang, Y. and Lee, W., "Intrusion Detection in Wireless Ad-Hoc networks," Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, pp. 275-283,2000. [7]Sanzgiri, Kimaya, et al. "A secure routing protocol for ad hoc networks." Proceedings of the IEEE International Conference 10th,pp. 78-87.Nov,2002 [8]Ali Dorri and Seyed Reza Kamel et al., "Security Challenges In Mobile Ad Hoc Networks" Proceedings of the International Journal of Computer Science & Engineering Survey (IJCSES), Vol.6, No.1, February,2015. [9]Xiuyuan Huang,Zheng ji Li,Guoyou Huang, “ The Security Technology of MANET“ Proceedings of the Asian University Department of Computer and Communication ,2006. [10]Sharma, Saloni, and Anuj Kumar Gupta. "A Comprehensive Review of Security Issues in Manets." Proceedings of the International Journal of Computer Applications,Vol.69, No.21,pp.32-37, May,2013 [11]Goyal, Priyanka, et al., "Manet: vulnerabilities, challenges, attacks, application." Proceedings of the International Journal of Computational Engineering & Management, vol.11, pp.32-372,011. [12]A.MISHRA, R. Jaiswal et al., " A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network," Proceedings of the International Conference on Advance Computing Conference 3rd, pp. 499-504. 2013. [13]M.A. Gorlatova, P. C. Mason, et al., " Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis," Proceedings of the IEEE Military Communications Conference, pp.1-7,2006. [14]S.Keer and A. Suryavanshi, "To prevent wormhole attacks using wireless protocol in MANET," Proceedings of the IEEE Computer and Communication Technology (ICCCT), pp. 159-163,Sep, 2010. [15]Z.A.Khan and M. H. Islam, "Wormhole attack: A new detection technique," Proceedings of the IEEE International Conference Emerging Technologies, pp.1-6 ,Oct ,2012. [16]S.Shaw, K. Orea, et al., " Simulation and Performance Analysis of OLSR under Identity Spoofing Attack for Mobile Ad-Hoc Networks," Proceedings of the Springer International Conference on Advances in Communication, Network, and Computing, vol. 142, pp. 308-310, 2011. [17]B.Kannhavong, H. Nakayama, et al, "A survey of routing attacks in mobile ad hoc networks," Proceedings of the IEEE Security in Wireless Mobile AD Hoc and Sensor Networks, vol. 14,pp. 85-91,2007 [18]M.Abdelhaq, R. Hassan, et al., "Using Dendritic Cell Algorithm to Detect the Resource Consumption Attack over MANET," Proceedings of the Springer International Conference on Software Engineering and Computer Systems, vol. 181, pp. 429-442, 2011. [19]L.Rajeswari, A. Prema, et al., "Enhanced intrusion detection techniques for mobile ad hoc networks," Proceedings of the International Conference on Information and Communication Technology in Electrical Sciences (ICTES), pp.1008-1013,Dec,2007. [20]J.Soryal and T. Saadawi, "IEEE 802.11 Denial of Service attack detection in MANET," Proceedings of the IEEE Wireless Telecommunications Symposium,pp.1-8,Apr,2012. [21]A.Hamieh and J. Ben-othman, "Detection of Jamming Attacks in Wireless Ad Hoc Networks Using Error Distribution," Proceedings of the International Conference on Communications,pp.1-6, 2009 [22]J.Ben-othman and A. Hamieh, "Defending method against jamming attack in wireless ad hoc networks," Proceedings of the IEEE 34th Conference on Local Computer Networks, pp.758-762, 2009 [23]D.Sharma, P. G. Shah, and X. Huang, "Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange," Proceedings of the IEEE International Conference on Network and System Security, pp.588-593,2010. [24]Douceur J R, "The sybil attack, "Proceedings of the Springer International Workshop on Peer-to-Peer Systems, pp.251-260,2002. [25]Davis CR, Fernandez JM, Neville S, et al. "Sybil attacks as a mitigation strategy against the storm botnet, "Proceedings of the IEEE International Conference on Malicious and Unwanted Software,pp. 32-40, Oct,2008. [26]Newsome J, Shi E, Song D, et al. "The Sybil attack in sensor networks: analysis & defenses, " Processing of the Third International Symposium on Information Processing in Sensor Networks,pp.259-268, Apr.2004 [27]Ankit Gupta,Deepak Sukheja,et al, "Impact of Sybil Attack and Security Threat in Mobile Adhoc Network, " Proceedings of the International Journal of Computer Applications, Vol 124, pp.5-12,Aug. 2015. [28]Kuan Zhang,Xiaohui Liang, et al., "Sybil Attacks and Their Defenses in the Internet of Things, "Proceedings of the IEEE Internet of Things Journal, Vol. 1,pp.372-383, Oct.2014 [29]Leslie Lamport, Robert Shostak,et al, “The Byzantine Generals Problem,” Proceedings of the ACM Transactions on Programming Languages and Systems, Vol. 4, pp. 382-401,July. 1982. [30]Miguel Castro,Microsoft Research,et al, “Practical Byzantine Fault Tolerance and Proactive Recovery,” Proceedings of the ACM Transactions on Computer Systems, Vol. 20, pp. 398–461,Nov.2002. [31]Miguel Castro and Barbara Liskov, "Practical Byzantine Fault Tolerance", Proceedings of the Third Symposium on Operating Systems Design and Implementation,pp.1-14, Feb.1999.
|