|
[1]Ad Hoc Routing Protocol Classification, February, 2009, Available: http://wiki.uni.lu/secan-lab/Ad-Hoc+Protocols+($28)Classification($29).html [2]P. Agrawal, R. K. Ghosh and S. K. Das, “Cooperative black and gray hole attacks in mobile ad hoc networks,” in Proc. 2nd international conference on Ubiquitous information management and communication, January, 2008, pp. 310-314. [3]S. Bose and A. Kannan, “Detecting denial of service attacks using cross layer based intrusion detection system in wireless ad hoc networks,” Signal Processing, Communications and Networking, January, 2008, pp. 182 – 188. [4]J.B.D. Cabrera, C. Gutierrez and R.K. Mehra, “Infrastructures and algorithms for distributed anomaly-based intrusion detection in mobile ad-hoc networks,” Military Communications Conference, October, 2005, pp.1831 – 1837. [5]H. Chen, Z. Ji, M. Hu, Z. Fu and R. Jiang, “Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol,” Journal of Network and Computer Applications Vol. 30, Issue 1, January, 2007, pp. 145-166. [6]H. Deng, Q. A. Zeng and D. P. Agrawal, “SVM-based intrusion detection system for wireless ad hoc networks, ” in Proc. IEEE VTC '03, Vol. 3, October, 2003, pp. 2147-2151. [7]H-W. Femg and C-L. Liu, “Design of a Joint Defense System for mobile ad hoc networks,” in Proc. IEEE VTC '06, May, 2006, pp. 742 – 746. [8]X-P. Gao and W. Chen, “A novel gray hole attack detection scheme for mobile ad hoc networks,” Network and Parallel Computing Workshops, IFIP International Conference on, September, 2007, pp. 209 - 214. [9]A. Hasswa, M. Zulkernine and H. Hassanein, “Routeguard:an intrusion detection and response system for mobile ad hoc networks,” Wireless And Mobile Computing, Networking And Communications, (WiMob'2005), IEEE International Conference, Vol. 3, August 2005, pp. 336 – 343. [10]Y.-A. Huang, W. Fan, W. Lee, P.S. Yu, “Cross-feature analysis for detecting ad hoc routing anomalies,” in Proc. 23th International Conference on Distributed Computing Systems, Providence, RI, May, 2003, pp. 478 – 487. [11]S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour and Y. Nemoto, “Detecting black hole attack on AODV-based mobile ad hoc networks by dynamic learning method,” International Journal of Network Security, Vol.5, No.3, November, 2007, pp. 338 – 346. [12]S. Madhavi, “An intrusion detection system in mobile ad hoc networks,” Information Security and Assurance, April, 2008, pp. 7 – 14. [13]S. Marti, T.J. Giuli, K. Lai, M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in 6th International Conference on Mobile Computing and Networking, MOBICOM’00, Auguest, 2000, pp. 255 – 265. [14]P. Ning , K. Sun, “How to Misuse AODV:a case study of insider attacks against mobile ad hoc routing protocols”, Ad Hoc Networks, Vol. 3, Issue 6, November, 2005, pp. 795-819. [15]A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis and Y. Yesha, “Threshold-based intrusion detection in ad hoc networks and secure AODV,” Ad Hoc Networks Vol. 6, Issue 4, June, 2008, pp. 578 – 599. [16]C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, February, 1999, pp. 90 – 100. [17]S.A. Razak, S.M. Furnell, N.L. Clarke, and P.J. Brooke, ”Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks,” Ad Hoc Networks, Vol. 6, Issue 7, September, 2008, pp. 1151-1167. [18]J. Sen, M.G. Chandra, S.G. Harihara, H. Reddy, P. Balamuralidhar, “A mechanism for detection of gray hole attack in mobile Ad Hoc networks,” Information, Communications & Signal Processing, 6th International Conference, December, 2007, pp. 1 – 5. [19]K. F. Ssu, C. H. Chou, and L. W. Cheng, “Using overhearing technique to detect malicious packet-modifying attacks in wireless sensor networks,” Computer Communications, Vol. 30, Issues 11-12, September, 2007, pp. 2342-2352. [20]L. Tamilselvan and V. Sankaranarayanan, “Prevention of black hole attack in MANET,” Wireless Broadband and Ultra Wideband Communications, AusWireless 2007, the 2nd International Conference, Auguest, 2007, pp. 21 – 26. [21]G. Vigna, S. Gwalani, K. Srinivasan, E.M. Belding-Royer and R.A Kemmerer, “An intrusion detection tool for AODV-based ad hoc wireless networks,” Computer Security Applications Conference, 20th Annual, December, 2004, pp. 16 – 27. [22]H. Weerasinghe and H. Fu, “Preventing cooperative black hole attacks in mobile ad hoc networks:simulation implementation and evaluation,” Future generation communication and networking (FGCN 2007) Vol. 2, December, 2007, pp. 362 – 367. [23]Y. Xiao, X. Shen, and D.-Z. Du , “A survey on intrusion detection in mobile ad hoc networks,” Wireless/Mobile Network Security, pp. 170 – 196. [24]W. Yu, Y. Sun and K.J.R. Liu, “HADOF:defense against routing disruptions in mobile ad hoc networks,” INFOCOM 2005, 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 2, March, 2005, pp. 1252–1261. [25]G. Zhang and S. Wang, “Aggregate and separate of signatures in wireless network,” Advanced Information Networking and Applications Workshops, 22nd International Conference, March, 2008, pp. 428 - 433. [26]L. Zhou and Z. Haas, “Securing ad hoc network,” IEEE Network Magazine, Special issue on network security, Vol. 13, No. 6, November/December 1999, pp. 24-30.
|