SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Wu B, Chen J, Wu J, Cardei M. A survey on attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Springer Series on Signals and Communication Technology, Xiao Y, Shen X, Du D-Z (ed). Chapter 5, 2007; 103135.
  • 2
    Corson S, Maker J. Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. rfc2501, 1999. www.ietf.org/rfc/rfc2501.txt.
  • 3
    Kaur R, Gaur MS, Suresh L, Laxmi V. DOS attacks in MANETs. In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, Santanam R, Sethumadhavan M, Virendra M (ed). Chapter 10, IGI Global, Hershey: Pennsylvania, USA, 2011; 124145. doi:10.4018/978-1-60960-123-2.
  • 4
    Jamalipour A, Kannhavong B, Nakayama H. A collusion attack against OLSR-based mobile ad hoc networks. In Global Telecommunications Conference, 2006. GLOBECOM '06, IEEE. 2006; 15.
  • 5
    Kannhavong B, Nakayama H, Kato N, Jamalipour A, Nemoto Y. A study of a routing attack in OLSR-based mobile ad hoc networks. International Journal of Communication Systems 2007; 20(11):12451261.
  • 6
    Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. SIGCOMM Computer Communication Review 1994; 24(4):234244.
  • 7
    Jacquet P, Muhlethaler P, Clausen T, Laouiti A, Qayyum A, Viennot L. Optimized link state routing protocol for ad hoc networks. rfc3626, 2001; page 47. www.ietf.org/rfc/rfc3626.txt
  • 8
    Johnson DB, Maltz DA, Broch J. DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks. In Ad Hoc Networking, Perkins CE (ed). Chapter 5, Dorling Kindersley, Pearson Education: Delhi, India, 2008; 139172.
  • 9
    Perkins CE, Royer EM. The Ad Hoc On-demand Distance-vector Protocol. In Ad Hoc Networking, Perkins CE (ed). Chapter 6, Dorling Kindersley, Pearson Education: Delhi, India, 2008; 173219.
  • 10
    Qayyum A, Laouiti A, Viennot L. Multipoint relaying: an efficient technique for flooding in mobile wireless networks. 35th Annual Hawaii International Conference on System Sciences HICSS02, Volume 9, Jan 7 - 10, Hawaii, USA, IEEE Computer Society: Los Alamitos, USA, 2002; 298.
  • 11
    Babu MK, Franklin AA, Murthy CSR. On the prevention of collusion attack in OLSR-based mobile ad hoc networks. IEEE International Conference on Networks (ICON 2008), New Delhi, India, 2008; 16.
  • 12
    Djahel S, Naїt-Abdesselam F, Zhang Z, Khokhar A. Defending against packet dropping attack in vehicular ad hoc networks. Security and Communication Networks 2008; 1(3):245258.
  • 13
    Suresh PL, Kaur R, Gaur MS, Laxmi V. A collusion attack detection method for OLSR-based MANETS employing scruple packets. Proceedings of the ACM 3rd International Conference on Security of Information and Networks, SIN' 10, New York, NY, USA, 2010; 256262.
  • 14
    Network simulator 3. http://www.nsnam.org.
  • 15
    Suresh PL, Kaur R, Gaur MS, Laxmi V. Collusion attack resistance through forced MPR switching in OLSR. In IEEEXplore IFIP Wireless Days. 2010; 15.