Cihan University-Erbil Conferences, 3rd International Conference on Communication Engineering and Computer Science (CIC-COCOS’19)

Font Size: 
AODV Inherent Techniques comparison for detecting and eliminating the black hole attack nodes in MANET
Ghassan Amanuel QasMarrogy, Yazen Saifuldeen Almashhadani

Last modified: 2019-04-25

References


References

[1] Sharma, S. B., & Chauhan, N. (2015, February). Security issues and their solutions in MANET. In 2015 International Conference on Futuristic Trends on Computational Analysis and Knowledge Management (ABLAZE) (pp. 289-294). IEEE.‏

[2] Sheikh, R., Chande, M. S., & Mishra, D. K. (2010, September). Security issues in MANET: A review. In 2010 Seventh International Conference on Wireless and Optical Communications Networks-(WOCN) (pp. 1-4). IEEE.‏

[3] Alslaim, M. N., Alaqel, H. A., & Zaghloul, S. S. (2014, April). A comparative study of MANET routing protocols. In The Third International Conference on e-Technologies and Networks for Development (ICeND2014) (pp. 178-182). IEEE.‏

[4] Chitkara, M., & Ahmad, M. W. (2014). Review on manet: characteristics, challenges, imperatives and routing protocols. International journal of computer science and mobile computing, 3(2), 432-437.‏

[5] Shenbagapriya, R., & Kumar, N. (2014, November). A survey on proactive routing protocols in MANETs. In 2014 International Conference on Science Engineering and Management Research (ICSEMR) (pp. 1-7). IEEE.‏

[6] Patel, D. N., Patel, S. B., Kothadiya, H. R., Jethwa, P. D., & Jhaveri, R. H. (2014, February). A survey of reactive routing protocols in MANET. In International Conference on Information Communication and Embedded Systems (ICICES2014) (pp. 1-6). IEEE.‏

[7] Dilli, R., & Reddy, P. C. S. (2016, July). Trade-off between length of the Hash code and performance of hybrid routing protocols in MANETs. In 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT) (pp. 732-735). IEEE.‏

[8] Dorri, A., Kamel, S. R., & Kheirkhah, E. (2015). Security challenges in mobile ad hoc networks: A survey. arXiv preprint arXiv:1503.03233.‏

[9] Alani, M. M. (2014, November). MANET security: A survey. In 2014 IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2014) (pp. 559-564). IEEE.‏

[10] Kuzlu, M., Pipattanasomporn, M., & Rahman, S. (2014). Communication network requirements for major smart grid applications in HAN, NAN and WAN. Computer Networks, 67, 74-88.‏

[11] Ranjan, R., Singh, N. K., & Singh, A. (2015, May). Security issues of black hole attacks in MANET. In International Conference on Computing, Communication & Automation (pp. 452-457). IEEE.‏

[12] El-Azhari, M. S., Al-Amoudi, O. A., Woodward, M., & Awan, I. (2009, May). Performance analysis in aodv based protocols for manets. In 2009 International Conference on Advanced Information Networking and Applications Workshops (pp. 187-192). IEEE.‏

[13] Kamel, M. B. M., Alameri, I., & Onaizah, A. N. (2017, March). STAODV: A secure and trust based approach to mitigate blackhole attack on AODV based MANET. In 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 1278-1282). IEEE.‏

[14] Dorri, A. (2017). An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET. Wireless Networks, 23(6), 1767-1778.‏