Liu et al., 2007 - Google Patents
An acknowledgment-based approach for the detection of routing misbehavior in MANETsLiu et al., 2007
View PDF- Document ID
- 17798869798296976484
- Author
- Liu K
- Deng J
- Varshney P
- Balakrishnan K
- Publication year
- Publication venue
- IEEE transactions on mobile computing
External Links
Snippet
We study routing misbehavior in MANETs (mobile ad hoc networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available …
- 238000001514 detection method 0 title description 28
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Liu et al. | An acknowledgment-based approach for the detection of routing misbehavior in MANETs | |
| Ishmanov et al. | Trust mechanisms to secure routing in wireless sensor networks: Current state of the research and open research issues | |
| Vigna et al. | An intrusion detection tool for AODV-based ad hoc wireless networks | |
| Djenouri et al. | Struggling against selfishness and black hole attacks in MANETs | |
| Michiardi et al. | Ad hoc networks security | |
| Shila et al. | Mitigating selective forwarding attacks with a channel-aware approach in WMNs | |
| Ghazizadeh et al. | Security-aware adaptive dynamic source routing protocol | |
| Yamini et al. | Improving routing disruption attack detection in MANETs using efficient trust establishment | |
| Jain et al. | Detecting and overcoming blackhole attack in mobile Adhoc Network | |
| Seth et al. | Detection and verification of decreased rank attack using round-trip times in RPL-based 6LoWPAN networks | |
| Yang | A study on improving secure routing performance using trust model in MANET | |
| Padiya et al. | Survey of innovated techniques to detect selfish nodes in MANET | |
| Kargl et al. | Sensors for detection of misbehaving nodes in MANETs | |
| Kolade et al. | Performance analysis of black hole attack in MANET | |
| Sen et al. | Routing security issues in wireless sensor networks: attacks and defenses | |
| Mahmoud et al. | A modified aodv routing protocol to avoid black hole attack in manets | |
| Tseng | Distributed intrusion detection models for mobile ad hoc networks | |
| Tamilarasi et al. | Secure enhancement scheme for detecting selfish nodes in MANET | |
| Azfar et al. | Impact analysis and a detection method for misbehaving nodes in Mobile ad-hoc networks | |
| Sundararajan et al. | Performance analysis of selfish node aware routing protocol for mobile ad hoc networks | |
| Dutta et al. | Specification based IDS for camouflaging wormhole attack in OLSR | |
| Bhasin et al. | Trust-Aware Distributed and Adaptive Energy Efficient Secure Routing in Sensor Networks. | |
| Griswold et al. | Malicious node detection in ad hoc wireless networks | |
| Liu | Detecting Routing Misbehavior In Mobile Ad Hoc Network | |
| Gunasekaran et al. | AAS: An Authenticated Acknowledgement-Based Scheme for Preventing Selfish Nodes in Mobile Ad Hoc Networks |