Open Access Journal
ISSN : 2394-2320 (Online)
International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)
Open Access Journal
International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)
ISSN : 2394-2320 (Online)
Reference :
1. Tseng, F. H., Chou, L. D., & Chao, H. C, “A survey of black hole attacks in wireless mobile ad hoc networks,” Human-centric Computing and Information Sciences, vol.1, issue 1, 2011
2. Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., & Nemoto, Y, “Detecting blackhole attack on AODV-based mobile ad hoc networks by dynamic learning method,” IJ Network Security, vol. 5, issue 3, pp. 338-346, 2007.
3. Keerthika, V., & Malarvizhi, N, “Mitigate black hole attack using trust with AODV in MANET,” Computing for Sustainable Global Development (INDIACom), pp. 470-474), 2016.
4. Woungang, I., Dhurandher, S. K., Koo, V., & Traore, I, “ Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks, Globecom Workshops (GC Wkshps), IEEE, pp. 1037-1041,2012.
5. Mukherjee, S., Chattopadhyay, M., & Chattopadhyay, S, “A novel encounter based trust evaluation for AODV routing in MANET,” Applications and Innovations in Mobile Computing (AIMoC), IEEE, pp. 141- 145, 2015.
6. Lupia, A., & De Rango, F, “Performance evaluation of secure AODV with trust management under an energy aware perspective,” Performance Evaluation of Computer and Telecommunication Systems, IEEE, pp. 599-606, 2014.
7. Abdelhaq, M., Serhan, S., Alsaqour, R., & Satria, A., “Security routing mechanism for black hole attack over AODV MANET routing protocol,” Australian Journal of Basic and Applied Sciences, vol. 5, issue 10, pp.1137- 1145,2011.
8. Lo, N. W., & Liu, F. L, “A secure routing protocol to prevent cooperative black hole attack in MANET,” Intelligent technologies and engineering systems, Springer, pp. 59-65, 2013.
9. Dhama, S., Sharma, S., & Saini, M, “Black hole attack detection and prevention mechanism for mobile ad-hoc networks,” Computing for Sustainable Global Development (INDIACom), IEEE, pp. 2993-2996, 2016.
10. Gupta, A. K., Sadawarti, H., & Verma, A. K, “ A review of routing protocols for mobile ad hoc networks,” SEAS Transactions on Communications, vol. 10, issue 11,pp. 331- 340,2011.
11. Cheng, H., & Cao, J, “A design framework and taxonomy for hybrid routing protocols in mobile ad hoc networks,” IEEE Communications Surveys & Tutorials, vol. 10, issue 3, 2008.
12. Karia, D. C., & Godbole, V. V, “New approach for routing in mobile ad-hoc networks based on ant colony optimisation with global positioning system,” IET networks, vol. 2, issue 3, pp.171- 180,2013.
13. Sarkar, S., & Datta, R, “Mobility-aware route selection technique for mobile ad hoc networks,” IET Wireless Sensor Systems, vol. 7, issue 3, pp55-64,2017.
14. Mohanapriya, M., & Krishnamurthi, I, “Modified DSR protocol for detection and removal of selective black hole attack in MANET,” Computers & Electrical Engineering, vol. 40, issue 2, pp. 530-538, 2014.
15. Taha, A., Alsaqour, R., Uddin, M., Abdelhaq, M., & Saba, T, “Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function,” IEEE Access, vol. 5, pp.10369-10381,2017.
16. Wahane, G., Kanthe, A. M., & Simunic, D, “Detection of cooperative black hole attack using crosschecking with truelink in MANET,” Computational Intelligence and Computing Research, IEEE International Conference ,pp. 1-6,2014.
17. Zhao, Z., Hu, H., Ahn, G. J., & Wu, R., “Riskaware mitigation for MANET routing attacks,” IEEE Transactions on dependable and secure computing, vol. 9, issue 2, pp.250- 260,2012.