References
- Lakhtaria KI, "Technological advancements and applications in mobile ad-hoc networks: research trends", IGI Global, 2012.
- A. Mehran, W. Tadeusz, D, "A review of routing protocols for mobile ad hoc networks", Ad Hoc Networks, p.1-22, 2004.
- Von Mulert J, Welch I, Seah WK, "Security threats and solutions in MANETs: a case study using AODV and SAODV, Journal of Networks and Computer Applications, p.1249-1259, 2012.
- Garcia Teodoro P, Sanchez Casado L, Macia Fernandez G, "Taxonomy and holistic detection of security attacks in MANETs", CRC Press, p. 1-12, 2014.
- C. Perkins, E. Royer, "Ad hoc on demand distance vector (AODV) routing", Second IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), p. 90-100, 1999.
- D.B. Johnson, A.D. Maltz, J. Broch, "DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks", Ad Hoc Networking, Addison-Wesley, p. 139-172, 2001.
- G. Arboit, C. Crepeau, C.R. Davis, M. Maheswaran, "A localized certificate revocation scheme for mobile ad hoc networks", Ad Hoc Networks, Vol. 6, p.17-31,
- N.C. Fernandes, M.D.D. Moreira, O.C.M.B. Duarte, "A self-organized mechanism for thwarting malicious access in ad hoc networks", IEEE INFOCOM'10, 2010.
- H. Xia, Z. Jia, L. Ju, and Y. Zhu, "Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory," IET Wireless Sensor System, vol. 1, p. 248-266, 2011.
- I. R. Chen, J. Guo, F. Bao, and J. Cho, "Trust management in mobile ad hoc networks for bias minimization and application performance maximization," Ad Hoc Networks., vol. 19, p. 59-74, 2014.
- L. H. G. Ferraz, P. B. Velloso, and O. C. M. B. Duarte, "An accurate and precise malicious node exclusion mechanism for ad hoc networks", Ad hoc Networks, vol. 19, p. 142-155, 2014.
- Karlof C, Wagner D, "Secure routing in wireless sensor networks: attacks and countermeasures", Ad hoc Networks, Vol. 1, p. 293-315, 2003 [Special Issue on Sensor Network Applications and Protocols].
- H.Deng, P. Agarwal, "Routing Security in Wireless Ad Hoc Networks", IEEE Communications Magazine, Vol.40, p. 70-75, 2002.
- B.Awerbuch, D. Holmer, C. Nita Rotaru, H. Rubens, "An On-demand Secure Routing Protocol Resilient to Byzantine Failures", ACM Workshop on Wireless Security, p. 21-30, 2002.
- Imran Raza, S.A. Hussain, "Identification of malicious nodes in an AODV pure ad hoc network through guard nodes", Computer Communications, p. 1796-1802, 2008.
- Jhaveri, Rutvij H., and Narendra M. Patel, "A sequence number based bait detection scheme to thwart gray hole attack in mobile ad hoc networks", Wireless Networks, Vol. 21, p. 2781-2798, 2015.
- Dorri, Ali, Soroush Vaseghi, and Omid Gharib, "DEBH: detecting and eliminating black holes in mobile ad hoc network", Wireless Networks, Vol. 24, p. 2943-2955, 2018.
- Tarun Varshney, Tushar Sharma, Pankaj Sharma, (2014), Implementation of Watchdog Protocol with AODV in Mobile Ad Hoc Network.
- Adwan Yasin, Mahmoud Abu Zant, "Detecting and Isolating Black-Hole Attacks in MANET using Timer Based Baited Technique", Wireless Communications and Mobile Computing, Vol. 1, 2018.
- Lyno Henrique G. Ferraz, Pedro B. Velloso, Otto Carlos M.B. Duarte, "An accurate and precise malicious node exclusion mechanism for ad hoc networks", Adhoc Networks, Vol.19, p.142-155,2014
- Ruo Jun Cai, Xue Jun Li , Peter Han Joo Chong, "An Evolutionary Self-Cooperative Trust Scheme Against Routing Disruptions in MANETs", IEEE Transactions On Mobile Computing, Vol. 18, P.42-55, 2019
- P. Zhou, S. Jiang, A. Irissappane, J. Zhang, J. Zhou, and J. C. M. Teo, "Toward energy-efficient trust system through watchdog optimization for WSNs," IEEE Transaction on Information Forensics Security, vol. 10, p. 613-625, 2015.
- W.B. Heinzelman, A.P. Chandrakasan, and H. Balakrishnan, "An application-specific protocol architecture for wireless microsensor networks," IEEE Transaction on Wireless Communication, vol. 1, p. 660-670, 2002.