Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. C. Perkins, E. Belding-Royer, and S. Das, “Ad-hoc ondemand distance vector (AODV) routing”, Internet Draft, RFC 3561, July 2003.
    2. Deng H, Li W, Agrawal DP, “Routing Security in Wireless Ad-hoc Networks”, IEEE Communications Magazine 40(10):70.75.doi:10.1109/MCOM.2002.1039859, (2002).
    3. Bo Sun,Yong Guan,Jian Chen,Udo W.Pooch, “Detecting Black-hole Attack in Mobile Ad Hoc Network”,5th European Personal Mobile Communications Conference, Glasgow, Volume 492, Issue, 22-25 pp.490 . 495, April 2003.
    4. Latha Tamilselvan and Sankaranarayanan, V., “Prevention of Black hole Attack in MANET”, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007)Pages 21-27,2007.
    5. Satoshi Kurosawa, Hidehisa Nakayama, Nei Kato, Abbas Jamalipour,and Yoshiaki Nemoto, “Detecting Black hole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method”, International Journal of Network Security, Vol.5, No.3, PP.338.346, Nov. 2007.
    6. Payal N. Raj, Prashant B. Swadas ,“DPRAODV: A Dynamic Learning System against Black hole Attack in Aodv Based Manet”,IJCSIInternational Journal of Computer Science Issues, Vol. 2, pp 54-59,2009.
    7. Hesiri Weerasinghe , “On Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks”, Proceedings of the IEEE International Conference on Communications, Jun. 24- 28,2011.
    8. Rutvij H. Jhaveri , Sankita J. Patel,“DoS Attacks in Mobile Ad-hoc Networks: A Survey”, Second International Conference on Advanced Computing and Communication Technologies. 2 (2), p535-540, 2012.
    9. Ming-Yang Su, “Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems”, Computer Communications 34 (2011) 107–117.
    10. “An Unobservable Secure Routing Protocol with Wormhole Attack Prevention for Mobile Ad-Hoc Network”, V Patil, P Fulare, N Ghodichor – (2014) 1930-1932

Recent Article