You are on page 1of 3

REFERENCES

[1] Sheela.D, Srividhya.V.R, Asma Begam, Anjali and Chidanand G.M, Detecting Black Hole Attack in Wireless Sensor Network using Mobile Agent , Proceedings of International Conference on Artificial Intelligence and Embedded Systems Singapore, pp 45-48, July 2012. [2] Kai Xing, Shyaam Sundhar Rajamadam Srinivasan, Manny Rivera, Jiang Li, Xiuzhen Cheng, Attacks and Countermeasures in Sensor Networks: A survey on Network Security, Springer, vol.1, pp 1-28, 2005. [3] Amol A. Bhosle, Tushar P. Thosar and Snehal Mehatre, Black-Hole and Wormhole Attack in Routing Protocol AODV in MANET, Internatio nal Journal of Computer Science Engineering and Applications vol 2, no.1, pp 22-28, February 2012. [4] Ranjeet Suryawanshi, Sunil Tamhankar, Performance Analysis And Minimization Of Black Hole Attack In MANET, International Journal of Engineering Research and Applications, vol. 2, no.4, pp.1430-1437, July-August 2012. [5] K. Biswas and Md. Liaqat Ali, Security threats in Mobile Ad -Hoc Network, Master Thesis, Blekinge Institute of Technology Sweden, 22nd March 2007. [6] Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sung Young Lee, A Novel Intrusion Detection Frame Work For Wireless Sensor Network, Personal and Ubiquitous Computing Springer Journal, vol.3, no.1, pp. 55-59, June 2012. [7] S. Lu, L. Li, K.Y. Lam, L. Jia, SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack., Proceedings of International Conference on Computational Intelligence and Security, Singapore, April 2009. [8] V.Mahajan, M.Natue and A.Sethi, Ana lysis of Wormhole Intrusion attacks in MANETs, Proceedings of IEEE Military Communications Conference, pp. 1-7, November 2008. [9] P. Papadimitratos and Z. J. Haas, Secure Data Transmission In Mobile Ad Hoc Networks, Proceedings of the 2003 ACM workshop on Wireless security, New York, USA: ACM Press, pp. 4150, September 2003.

38

[10] C. Karlof, N. Sastry, D. Wagner, A Link Layer Security Architecture For Wireless Sensor Networks, Proceedings of the 2nd International conference on Embedded networked sensor systems, Baltimore, MD, USA, pp. 162 175, April 2004. [11] I.Krontiris, Thanassis Giannetsos, Tassos Dimitriou,Intrusion Detection Of Sinkhole Attacks In Wireless Sensor Networks, Proceedings of the 3rd International Workshop on Algorithmic Aspects of Wireless Sensor Networks, Wroclaw, Poland, pp. 123-128, July 2007. [12] P. Traynor, H. Choi, G. Cao, S. Zhu, and T. La-Porta, Establishing pair-wise keys in heterogeneous sensor networks, Proceedings of the 25th IEEE International Conference on Computer Communications ,Barcelona, Spain, pp. 6-10, 1-12, 2006. [13] Mangesh Ghonge, Prof. S. U. Nimbhorkar, Simulation of AODV under Blackhole Attack in MANET, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no 2, pp. 219-223 February 2012. [14] Harjeet Kaur, Manju Bala, Varsha Sahni, Study of Blackhole Attack Using Different Routing Protocols in MANET, International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, vol. 2, no 7, July 2013. [15] Ashok M.Kanthe, Dina Simunic and Ramjee Prasad, Compar ison of AODV and DSR On-Demand Routing Protocols in Mobile Ad hoc Networks, Proceedings of the 2nd International conference on Embedded networked sensor systems, Baltimore, MD, USA, pp. 192 199, April 2008. [16] Vinay P.Virada, Securing and Preventing AODV Routing Protocol From Black Hole Attack Using Counter Algorithm, International Journal of Engineering Research & Technology vol. 1 no 8, October 2012. [17] Ashish Bagwari, Raman Jee,Pankaj Joshi and Sourabh Bisht, Performance Of AODV Routing Protocol With Increasing The MANET Nodes And Its Effects On Qos Of Mobile Ad Hoc Networks, Proceedings of International Conference on Communication Systems and Network Technologies, Sweden, pp. 131-138, April 2009.

39

[18] S. Lu, L. Li, K. Lam and L. Jiya, SAODV: A MANET Routing Protocol Th at Can Withstand Black Hole Attack, Proceedings of CIS International Conference on Computational Intelligence and Security, Beijing, pp. 421-425, 11- 14 December 2009. [19] Alok Rao, Narendra Upadhyay, Vivek Kumar Rai, A Survey on AODV Protocol Performance with Black Hole Node in MANET, International Journal of Engineering and Advanced Technology, vol 2, no 4, pp. 122-127. April 2013. [20] Wang Xin-sheng, Zhan Yong-zhao, Xiong Shu-ming, and Wang Liang-min, Lightweight defense scheme against selective forwarding attacks in wireless sensor networks, International Journal of Computer Science Engineering and Applications, vol 2, no.1 pp. 226232, Oct. 2009. [21] AlecWoo, Terence Tong, and David Culler, Taming The Underlying Challenges f Reliable Multihop Routing In Sensor Networks, Proceedings of the 1 st International Conference on Embedded networked sensor systems, pp. 1427, New York, USA, 2003. [22] Irshad Ullah, Shoaib Ur Rehman, Analysis of Black Hole attack On MANETs Using different MANET Routing Protocols, Master Thesis, Blekinge Institute of Technology, Sweden, June 2010. [23] Network Simulator ns-2 www.isi.edu/nsnam/ns/

40

You might also like