Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

  1. 1. Tseng, F. H., Chou, L. D., & Chao, H. C, “A survey of black hole attacks in wireless mobile ad hoc networks,” Human-centric Computing and Information Sciences, vol.1, issue 1, 2011

    2. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y, “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method,” IJ Network Security, vol. 5, issue 3, pp. 338-346, 2007.

    3. Keerthika, V., & Malarvizhi, N, “Mitigate black hole attack using trust with AODV in MANET,” Computing for Sustainable Global Development (INDIACom), pp. 470-474), 2016.

    4. Woungang, I., Dhurandher, S. K., Koo, V., & Traore, I, “ Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks, Globecom Workshops (GC Wkshps), IEEE, pp. 1037-1041,2012.

    5. Mukherjee, S., Chattopadhyay, M., & Chattopadhyay, S, “A novel encounter based trust evaluation for AODV routing in MANET,” Applications and Innovations in Mobile Computing (AIMoC), IEEE, pp. 141- 145, 2015.

    6. Lupia, A., & De Rango, F, “Performance evaluation of secure AODV with trust management under an energy aware perspective,” Performance Evaluation of Computer and Telecommunication Systems, IEEE, pp. 599-606, 2014.

    7. Abdelhaq, M., Serhan, S., Alsaqour, R., & Satria, A., “Security routing mechanism for black hole attack over AODV MANET routing protocol,” Australian Journal of Basic and Applied Sciences, vol. 5, issue 10, pp.1137- 1145,2011.

    8. Lo, N. W., & Liu, F. L, “A secure routing protocol to prevent cooperative black hole attack in MANET,” Intelligent technologies and engineering systems, Springer, pp. 59-65, 2013.

    9. Dhama, S., Sharma, S., & Saini, M, “Black hole attack detection and prevention mechanism for mobile ad-hoc networks,” Computing for Sustainable Global Development (INDIACom), IEEE, pp. 2993-2996, 2016.

    10. Gupta, A. K., Sadawarti, H., & Verma, A. K, “ A review of routing protocols for mobile ad hoc networks,” SEAS Transactions on Communications, vol. 10, issue 11,pp. 331- 340,2011.

    11. Cheng, H., & Cao, J, “A design framework and taxonomy for hybrid routing protocols in mobile ad hoc networks,” IEEE Communications Surveys & Tutorials, vol. 10, issue 3, 2008.

    12. Karia, D. C., & Godbole, V. V, “New approach for routing in mobile ad-hoc networks based on ant colony optimisation with global positioning system,” IET networks, vol. 2, issue 3, pp.171- 180,2013.

    13. Sarkar, S., & Datta, R, “Mobility-aware route selection technique for mobile ad hoc networks,” IET Wireless Sensor Systems, vol. 7, issue 3, pp55-64,2017.

    14. Mohanapriya, M., & Krishnamurthi, I, “Modified DSR protocol for detection and removal of selective black hole attack in MANET,” Computers & Electrical Engineering, vol. 40, issue 2, pp. 530-538, 2014.

    15. Taha, A., Alsaqour, R., Uddin, M., Abdelhaq, M., & Saba, T, “Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function,” IEEE Access, vol. 5, pp.10369-10381,2017.

    16. Wahane, G., Kanthe, A. M., & Simunic, D, “Detection of cooperative black hole attack using crosschecking with truelink in MANET,” Computational Intelligence and Computing Research, IEEE International Conference ,pp. 1-6,2014.

    17. Zhao, Z., Hu, H., Ahn, G. J., & Wu, R., “Riskaware mitigation for MANET routing attacks,” IEEE Transactions on dependable and secure computing, vol. 9, issue 2, pp.250- 260,2012.


Recent Article