Pendeteksian Dan Pencegahan Serangan Black Hole & Gray Hole Pada Manet
Abstract
Full Text:
PDFReferences
Chancal Lohi, S. K. Sharma “A Survey of Mitigation Techniques to Black Hole Attack and gray Hole Attack in MANET” IJCTA, Volume 5, pp 560 – 567
M. Medadian, K. Fardad, A. Mebabdi “Proposing a Methode to Remove Gray Hole Attack in AODV Protocol in MANET” IJESIT, Volume 2, Issue 6, 2013
V. Shanmuganathan, T. Anand, “A Survey on Gray Hole Attack in MANET”IRACST, Volume 2, No 8, 2012
K.S. Sujatha et, al. “Design of Genetic Algorithm Based IDS for MANET” ICRTIT 2012, IEEE, pp 28-33
Rajes Yerneni and A.K. Sarje “Secure AODV Protocol to Mitigate Black Hole Attack in Mobile Ad Hoc Networks” ICCCNT 2012, IEEE, pp 248-252
Maha Abdelhaq et, al “A Local Intrusion Detection Routing Security Over MANET Network” 2011 International Conference on Electrical Engineering and Informatics, 2011, IEEE
Piyush Agrawal, R. K. Ghosh and Sajal K Das “ Cooperative Black and Gray Hole Attacks in Mobile Ad Hoc Networks”, 2nd International Conference on Ubiquitous Information Management and Communication , 2008, pp 310-314
Oscar F. Gonzalez, Godwin Ansa, Michael Howarth, and George Paviou “Detectoin and Accusation of Packet Forwarding Misbehaviour in Mobile Ad- Hoc Networks”, Journal of Internet Engineering , Vol2, no1, June 2008, pp 181-192
Payat N Raj and Prahsant B. Swadas, “DPRAODV: A Dynamic Learning System Against Blackhole Attack in AODV Based MANET” International Journal of Computer Science Issues , Vol 2, Issue 3, 2010, pp. 54-59
Hongmei Deng, Wei Li, and Dharma P. Agrawal, “ Routing Security in Wireless Ad-Hoc Network”, IEEE Communicatoins Magazine, Issue 40, 2002, pp 70-75.
G. Usha and S. Bose “Comparing The Impact of Blackhole and Grayhole Attacks in Mobile Ad Hoc Networks”, Journal of Computer Science 2012, Volume 8, Issue 11 , pp. 1788 – 1802
G. Usha and S. Bose, “Impact of Gray Hole Attack on Ad Hoc Networks “
Mehdi Medadian, Khossro Fardad, Ahmad Mebadi, “Proposing a Method to Remove Gray Hole Attack in AODV Protocol in MANET”, IJESIT, Volume 2, Issue 6 November 2013
Refbacks
- There are currently no refbacks.