- S. Shahabi, M. Ghazvini, M. Bakhtiarian, “A modified algorithm to improve security and performance of AODV protocol against black hole attack,” Wireless Networks, vol. 22, pp. 1505-1511, July 2016.
- S. M. Pournaghi, M. Barmshoori, M. Gardeshi, “An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs,” Journal of Electronical & Cyber Defence, vol. 3, pp. 1-12, 2015. (in Persian)
- L. J. Garcia Villalba, J. Garcia Matesanz, A. L. Sandoval Orozco, and J. D. Marquez Diaz, “Auto-configuration protocols in mobile ad hoc networks,” Sensors, vol. 11, pp. 3652-3666, Mar. 2011.
- S. K. Dhurandher, M. S. Obaidat, K. Verma, P. Gupta, and P. Dhurandher, “FACES: friend-based ad hoc routing using challenges to establish security in manets systems,” IEEE Systems Journal, vol. 5, pp. 176-188, Jun 2011.
- A. Golestani, K. Mohamedpour, and A. Habibi Bastami, “Enhancing Communication Security in Cellular Communications Networks by using Interference Alignment Technique,” Journal of Electronical & Cyber Defence, vol. 3, pp. 49-60, 2015. (in Persian)
- P. K. Maurya, G. Sharma, V. Sahu, A. Roberts, M. Srivastava, and M. Scholar, “An overview of AODV routing protocol,” International Journal of Modern Engineering Research (IJMER), vol. 2, pp. 728-732, May 2012.
- G. S. Tomar, T. Sharma, D. Bhattacharyya, and T. H. Kim, “Performance comparision of AODV, DSR and DSDV under various network conditions: a survey,” In Ubiquitous Computing and Multimedia Applications (UCMA), 2011 International Conference on, IEEE, pp. 3-7, Apr. 2011.
- R. Das, B. S. Purkayastha, and P. Das, “Security measures for black hole attack in Manet: An approach,” arXiv preprint arXiv: 1206.3764, Jun 2012.
- S. Kurosawa, H. Nakayama, N. Kato, A. Jamalipour, and Y. Nemoto, “Detecting blackhole attack on AODV-based mobile
- ad hoc networks by dynamic learning method,” IJ Network Security. vol. 5, pp. 338-346, Nov. 2007.
- S. Jamali and S. Behzad, “A survey over black hole attack detection in mobile ad hoc network,” International Journal of Computer Science and Network Security (IJCSNS), vol. 15, p. 44, Mar. 2015.
- T. K. Araghi, M. Zamani, A. B. Manaf, S. M. Abdullah, H. S. Bojnord, and S. K. Araghi,” A secure model for prevention of black hole attack in wireless mobile ad hoc networks,” In12th International Conference on Applied Computer and Applied Computational Science (ACACOS ‘13), Kualalumpur, Malaysia, pp. 2-4, Apr. 2013.
- S. K. Arora, S. Vijan, and G. S. Gaba, “Detection and analysis of black hole attack using IDS,” Indian Journal of Science and Technology, vol. 9, May 2016.
- N. Khemariya and A. Khuntetha, “An efficient algorithm for detection of blackhole attack in aodv based manets,” International Journal of Computer Applications, vol. 66, Jan 2013.
- K. S. Sujatha, V. Dharmar, and R. S. Bhuvaneswaran,” Design of Genetic Algorithm based IDS for MANET,” InRecent Trends In Information Technology (ICRTIT), 2012 International Conference on, pp. 28-33, IEEE, Apr. 2012.
- M. Salehi and H. Samavati, “Dsr vs olsr: Simulation based comparison of ad hoc reactive and proactive algorithms under the effect of new routing attacks,” InNext Generation Mobile Applications, Services and Technologies (NGMAST), 2012 6th International Conference on, IEEE, pp. 100-105, Sep. 2012.
- S. Dubey and P. Saxena, “A Review on Collaborative Decision Technique for Blackhole Attack Prevention in MANET,” International Journal of Scientific & Engineering Research, vol. 7, pp. 230-236, Jan 2016.
- V. Kamatchi and R. Mukesh, “Securing data from black hole attack using aodv routing for mobile ad hoc networks,” In Advances in Computing and Information Technology, Springer, Berlin, Heidelberg, vol. 177, pp. 365-373, 2013.
- S. Banerjee, M. Sardar, and K. Majumder, “Aodv based black-hole attack mitigation in manet,” In Proceedings of the International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2013, Springer, Cham, vol. 247, pp. 345-352, 2014.
- I. Zangeneh, M. Sadeghzade, and S. J. Mirabedini, “A new method for detecting and removing a single black hole attack in AODV protocol ad hoc network,” First National Conference on Electrical and Computer southern Iran, Islamic Azad University of Khormoj, May 2013. (in Persian)
- A. Momeni and M. Parhizgar, “Providing a safe location service to cope with the attack of a black hole,” The first Conference of artificial intelligence systems and their applications, Payamnoor University of Tehran, 2011. (in Persian)
- A. Vangili and K. Thangadurai, “Detection of black hole attack in mobile ad-hoc networks using ant colony optimization–simulation analysis,” Indian Journal of Science and Technology, vol. 8, Jul. 2015.
- M. Medadian, K. Fardad, and I. Barazande, “Discovered and removed a mass black hole attacks on mobile networks Ad Hoc,” First National Conference on Soft Computing and Information Technology, Islamic Azad University of Mahshahr, Mar. 2011. (in Persian)
- M. Al-Shurman, S. M. Yoo, and S. Park, “Black hole attack in mobile ad hoc networks,” In Proceedings of the 42nd annual Southeast regional conference, ACM, pp. 96-97, Apr. 2004.
- A. A. Arjomand, “Provide a way to confronting with black hole attacks in ad hoc networks and survey its effect on basic parameters of AODV routing protocol,” The First Conference on Advances and Challenges in Engineering and Technology Sciences (SET), Advanced Institute of Science and Technology Kharazmi, Shiraz, Iran, Jan 2016. (in Persian)
- R. Kesavan and V. T. Bai, “Avoidance of Black Hole Attack in Virtual Infrastructure for MANET,” International Journal of Computer Applications, vol. 50, pp. 26-31, Jan 2012.
- E. Azizi Abolmomen and A. Nori, “Provide a way to detect and prevent of black hole nodes attack in Ad hoc networks,” First Regional Conference on Theoretical and Applicational in Computer Engineering and Information Technology, University of Science and Technology of Saghez, 2015. (in Persian)
|