[1]
|
W. Stallings, “Network Security Essentials: Applications and Standards,” 2nd Edition, Prentice Hall, Upper Saddle River, 2003.
|
[2]
|
CERT Statistics (Historical).
http://www.cert.org/historical/
|
[3]
|
C. Kim, E. Talipov and B. Ahn, “A Reverse AODV Routing Protocol in Ad Hoc Mobile Networks,” Proceeding from EUC’06: The 2006 International Conference on Emerging Directions in Embedded and Ubiquitous Computing, Seoul, 1-4 August 2006, pp. 522-531.
|
[4]
|
S. Dokurer, Y. M. Erten and E. A. Can, “Performance Analysis of Ad-Hoc Networks under Black Hole Attacks,” Proceeding from SE-CON’07: IEEE Southeast Conference, Richmond, 22-25 March 2007, pp. 148-153.
|
[5]
|
M. Imani, M. E. Rajabi, M. Taheri and M. Naderi, “Vulnerabilities in Network Layer at Wireless Mesh Network (WMNs),” Proceeding from ICENT’10: 2010 International Conference on Educational and Network Technology, Qinhuangdao, 25-27 June 2010, pp. 487-492.
doi:10.1109/ICENT.2010.5532257
|
[6]
|
F. Nait-Abdesselam, B. Bensaou and T. Taleb, “Detecting and Avoiding Wormhole Attacks in Wireless Ad-Hoc Networks,” IEEE Communication Magazine, Vol. 46, No. 4, 2008, pp. 127-133. doi:10.1109/MCOM.2008.4481351
|
[7]
|
V. Zhang, J. Zheng and H. Hu, “Security in Wireless Mesh Networks,” Auerbach Publications Taylor & Francis Group, London, 2009.
|
[8]
|
I. Aad, P. J. Hubaux and W. E. Knightly, “Impact of Denial-of-Service Attacks on Ad-Hoc Networks,” IEEE-ACM Transactions on Networking, Vol. 16, No. 4, 2008, pp. 791-802. doi:10.1109/TNET.2007.904002
|
[9]
|
R. Jain, “The Art of Computer System Performance Analysis,” John Wiley and Sons, Inc., Hoboken, 1991.
|
[10]
|
E. Cayirci and C. Rong, “Security in Wireless Ad Hoc and Sensor Networks,” John Wiley & Sons Publications, 1st Edition, Hoboken, 2009.
|
[11]
|
CERT Statistics (Historical).
http://www.cert.org/historical/
|
[12]
|
D. Mishra, K. Y. Jain and S. Agarwal, “Behavior Analysis of Malicious Node in the Different Routing Algorithms in Mobile Ad Hoc Network (MANET),” Proceeding from ACT’09: Advances in Computing, Control and Telecommunication Technologies, Trivandrum, 28-29 December 2009, pp. 621-623.
|
[13]
|
D. Bansal and S. Soffat, “Use of Cross Layer Interactions for Denial of Service Attacks in WMN,” Proceeding from NETWORKS’10: The 14th international Telecommunications, Network Strategy and Planning Symposium, Warsaw, 27-30 September 2010, pp. 1-6.
|
[14]
|
R. Rangara, R. Jaipuria, G. Yenugwar and P. Jawandhiya, “Intelligent Secure Routing Model for MANET,” Proceeding from ICCSIT’10: 3rd International Conference on Computer Science and Information Technology, Chengdu, 2010, p. 452.
|
[15]
|
S. Umang, B. V. R. Reddy and M. N. Hoda, “Enhanced Intrusion Detection System for Malicious Node Detection in Ad Hoc Routing Protocols Using Minimal Energy Consumption,” IET Communications, Vol. 4, No. 17, 2010, pp. 2084-2094. doi:10.1049/iet-com.2009.0616
|
[16]
|
M. D. Shila, Y. Cheng and T. Anjali, “Mitigating Selective Forwarding Attacks with a Channel-Aware Approach in WMNs,” IEEE Transactions on Wireless Communication, Vol. 9, No. 5, 2010, pp. 1661-1675.
doi:10.1109/TWC.2010.05.090700
|
[17]
|
S. Hashmi and J. Brooke, “Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks,” Proceeding from SECUR-WARE’10: 4th International Conference on Emerging Security Information Systems and Technologies, Venice, 18-28 July 2010, pp. 17-24.
|
[18]
|
L. Hong, W. Chen, L. Gao, G. Zhang and C. Fu, “Grey Theory Based Reputation System for Secure Neighbor Discovery in Wireless Ad Hoc Networks,” Proceeding from ICFCC’10: 2nd International Conference on Future Computer and Communication, Wuhan, 21-24 May 2010, pp. V2-V749.
|
[19]
|
L. Tamilselvan and V. Sankarnarayanan, “Prevention of Blackhole Attack in MANET,” Proceeding from AUS-WIRELESS’07: 2nd International Conference on Wireless Broadband and Ultraband Communications, Sydney, 27-30 August 2007, p. 21.
|
[20]
|
S. Lu, L. Li, K. Lam and L. Jiya, “SAODV: A MANET Routing Protocol That Can Withstand Black Hole Attack,” Proceeding from CIS’06: International Conference on Computational Intelligence and Security, Beijing, 11-14 December 2009, pp. 421-425.
|
[21]
|
E. Gerhards-Padilla, N. Aschenbruck, P. Martini, M. Jahnke and J. Tolle, “Detecting Black Hole Attacks in Tactical MANETs Using Topology Graphs,” Proceeding from LCN’07: 32nd IEEE Conference on Local Computer Networks, Dublin, 15-18 October 2007, pp. 1043-1052.
|
[22]
|
A. Prathapani, L. Santhanam and P. D. Agarwal, “Intelligent Honeypot Agent for Blackhole Attack Detection in Wireless Mesh Networks,” Proceeding from MASS’09: IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, Macau, 12-15 October 2009, pp. 753-758.
|
[23]
|
L. Coleman, M. Martin, T. Meurer and K. Plauche, “Honeypot Technology,” 2009.
http://students.kennesaw.edu/~lec6557/Formal%20Report.htm
|
[24]
|
F. Y. Alem and C. Z. Xuan, “Preventing Black Hole Attack in Mobile Adhoc Networks Using Anomaly Detection,” Proceeding from ICFCC’10: International Conference on Future Computer and Communication, Wuhan, 21-24 May 2010, pp. V3-V672.
|
[25]
|
T. Krone, “Hacking Motives [PDF Document]”.
http://www.aic.gov.au/publications/current%20series/htcb/1-20/htcb006.aspx
|