[1]
|
Nguyen, H.L. and Nguyen, U.T. (2008) A Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks. Ad Hoc Networks, 6, 32-46. http://dx.doi.org/10.1016/j.adhoc.2006.07.005
|
[2]
|
Karmore, P. and Bodkhe, S. (2011) A Survey on Intrusion in Ad Hoc Networks and its Detection Measures. International Journal on Computer Science and Engineering, Chennai.
|
[3]
|
Rai, A.K., Tewari, R.R. and Upadhyay, S.K. (2010) Different Types of Attacks on Integrated MANET. Internet Communication. International Journal of Computer Science and Security, 4.
|
[4]
|
Chand, K.K., Bharati, P.V. and Ramanjaneyulu, B.S. (2012) Optimized Energy Efficient Routing Protocol for Life- Time Improvement in Wireless Sensor Networks. Proc. Int. Conf. Adv. Eng., Sci. Manage. (ICAESM), 345-349.
|
[5]
|
Singh, S.K., Singh, M.P. and Singh, D.K. (2010) Routing Protocols in Wireless Sensor Networks—A Survey. International Journal of Computer Science and Engineering Survey, 1, 63-83. http://dx.doi.org/10.5121/ijcses.2010.1206
|
[6]
|
Abidoye, A.P., Azeez, N.A., Adesina, A.O. and Agbele, K.K. (2011) ANCAEE: A Novel Clustering Algorithm for Energy Efficiency in Wireless Sensor Networks. Wireless Sensor Networks, 3, 307-312. http://dx.doi.org/10.4236/wsn.2011.39032
|
[7]
|
Chatterjee, S. and Singh, M. (2012) A Centralized Energy-Efficient Routing Protocol for Wireless Sensor Networks. International Journal of Advanced Networking and Applications, 3, 12-18.
|
[8]
|
Rejina Parvin, J. and Vasanthanayaki, C. (2015) Particle Swarm Optimization-Based Clustering by Preventing Residual Nodes in Wireless Sensor Networks. IEEE Sensors Journal, 15.
|
[9]
|
Chang, J.M., Tsou, P.C., Woungang, I., Chao, H.C. and Lai, C.F. (2015) Defending against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. IEEE Systems Journal, 9.
|
[10]
|
Baadache, A. and Belmehdi, A. (2010) Avoiding Blackhole and Cooperative Blackhole Attacks in Wireless Ad Hoc Networks. International Journal of Computer Science and Information Security, 7.
|
[11]
|
Vishnu, K. and Paul, A.J. (2010) Detection and Removal of Cooperative Black/Gray Hole Attack in Mobile Ad Hoc Networks. International Journal of Computer Applications, 1, 28-32.
|
[12]
|
Liu, K., Pramod, D., Varshney, K. and Balakrishnan, K. (2007) An Acknowledgement Based Approach for the Detection of Routing Misbehavior in MANETs. IEEE Transactions on Mobile Computing, 6, 536-550. http://dx.doi.org/10.1109/TMC.2007.1036
|
[13]
|
Deng, S., Li, J. and Shen, L. (2011) Mobility-Based Clustering Protocol for Wireless Sensor Networks with Mobile Nodes. IET Wireless Sensor Systems, 1, 39-47. http://dx.doi.org/10.1049/iet-wss.2010.0084
|
[14]
|
Weerasinghe, H. and Fu, H. (2007) Preventing Cooperative Blackhole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Proceedings of IEEE ICC, 362-367.
|
[15]
|
Xue, Y. and Nahrstedt, K. (2004) Providing Fault-Tolerant Ad Hoc Routing Service in Adversarial Environments. Wireless Personal Communications, 29, 367-388. http://dx.doi.org/10.1023/B:WIRE.0000047071.75971.cd
|