Computer Science ›› 2017, Vol. 44 ›› Issue (1): 159-166.doi: 10.11896/j.issn.1002-137X.2017.01.031
Previous Articles Next Articles
WANG Wei, WANG Jia-jun, WANG Ming-ming, ZHANG Wen-jing and CHEN Jin-guang
[1] MEHER R,LADHE S.Review Paper on Flooding Attack inMANET [J].Journal of Engineering Research and Applications,2014,4(1):39-46. [2] LI F,JASSIM S.Malicious nodes seriously affect the performance of mobile ad hoc networks [EB/OL].[2014-9-21].http://spie.org/x8693.xml. [3] HE Jin-lu,CHU Wei,LIU Hui-zhou.Research and Improve-ment of AODV Routing Protocol[J].Computer Engineering,2015,41(1):110-114.(in Chinese) 何绵禄,褚伟,刘辉舟.AODV路由协议的研究和改进[J].计算机工程,2015,41(1):110-114. [4] DORRI A,KAMEL S R,KHEIRKHAH E.Security challenges in mobile ad hoc networks:a survey [J].International Journal of Computer Science and Engineering Survey,2015,6(1):15-29. [5] LIANG M,TING H,SWAMI A,et al.Node Failure Localization via Network Tomography[C]∥Proc.of the 2014 Confe-rence on Internet Measurement Conference.Vancouver,BC,Canada,2014:195-208. [6] ZAMANI A T,ZUBAIR S.Security in Routing Protocol for Ad Hoc Networks [J].International Journal of Science and Research,2014,3(4):375-380. [7] KATARIA J,DHEKNE P S,SANYAL S.A Scheme to Control Flooding of Fake Route Requests in Ad-hoc Networks[C]∥Proc.of the 3rd International Conference on Computers and Devices for Communication.West,India,2006:198-201. [8] AHMAD S,AWAAN I,WAQQAS A,et al.Performance Analysis of DSR & Extended DSR Protocols [C]∥Proc.of the 2nd Asia International Conference on Modeling & Simulation.Kuala Lumpur,2008:191-196. [9] GOPALAKRISHNAN S,GANESHKUMAR P.Intrusion De-tection in Mobile Ad Hoc Network Using Secure Routing For Attacker Identification Protocol [J].American Journal of Applied Sciences,2014,11(8):1391-1397. [10] ZISHAN N,CHOLE V.Intrusion Detection Systems and Securi-ty Aspects for Mobile Ad Hoc Networks [J].International Journal on Recent and Innovation Trends in Computing and Communication,2015,3(2):446-448. [11] ZHANG Y,LEE W.Intrusion Detection Techniques for Mobile MANET [J].Wireless Networks Journal,2003,9(5):545-556. [12] LEILA M,DJEMILI T F,SALIM G.MASID:Multi-Agent System for Intrusion Detection in MANET [C]∥Proc.of the Ninth International Conference on Information Technology:New Gene-rations (ITNG).Las Vegas:IEEE Press,2012:65-70. [13] WANG W,MAN H,LIU Y.A framework for intrusion detection systems by social network analysis methods in ad hoc networks [J].Security Communication Networks,2009,2(6):669-685. [14] ZHANG Xiao-ning,FENG Deng-guo.Instrusion dectection forad hoc routing based on fuzzy behavior analysis[J].Journal of Computer Research and Development,2006,3(4):621-626.(in Chinese) 张晓宁,冯登国.基于模糊行为分析的移动自组网入侵检测[J].计算机研究与发展,2006,3(4):621-626. [15] YI P,JIANG Xing-hao,WU Yue,et al.Distributed intrusion detection for mobile ad hoc networks [J].Journal of Systems Engineering and Electronics,2008,19(4):851-859. [16] MARCHANG N,DATTA R.Collaborative techniques for intrusion detection in mobile ad-hoc networks [J].Ad Hoc Networks,2008,6(2008):508-523. [17] OTROK H,MOHAMM N,WANG L,et al.A game-theoretic intrusion detection model for mobile ad hoc networks [J].Computation Communication,2008,31(4):708-721. [18] MANOUSAKIS K,STERNE D,IVANIC N,et al.A stochastic approximation approach for improving intrusion detection data fusion structures [C]∥Proc.of the IEEE Military Communications Conference.San Diego,CA,2008:1-7. [19] EU Z A,KHOON W,SEAH G H.Mitigating Route RequestFlooding Attacks in Mobile Ad hoc Networks [C]∥Proc.of International Conferences on Information Networking.Sendai,Japan,2006. [20] YI S,KRAVETS R.Composite Key Management for Ad Hoc Networks [C]∥Proc.of the 1st Annual International Conferen-ce on Mobile and Ubiquitous Systems:Networking and Servi-ces.2004:52-61. [21] SHANDILYA S K,SAHU S.A trust based security scheme for RREQ flooding attack in MANET [J].International Journal of Computer Applications,2010,5(12):4-8. [22] BHUVANESHWARI K,DEVARAJ A F S.PDS-A Profilebased Detection Scheme for flooding attack in AODV based MANET [J].International Journal of Security,Privacy and Trust Management,2013,2(3):17-28 [23] C J D.A new authentication model for ad hoc networks[J].International Journal of Information Security,2012,11(5):333-347. [24] WANG Wei,GUAN Xiao-hong,WANG Bei-zhan,et al.Evaluation method with measureable space-time dynamic properties for mobile ad hoc networks[J].Journal of Software,2011,22(6):1333-1349.(in Chinese) 王伟,管晓宏,王备战,等.可量化的移动Ad Hoc网络时空动态特性评估方法[J].软件学报,2011,22(6):1333-1349. [25] LI Y,CAI W,TIAN G I,et al.Loss Cumulant Generating Function Inference in Sensor Network[C]∥Proc.of the International Conference on Wireless Communications,Networking and Mobile Computing.Wuhan,China,2006:1-4. [26] JIAO Li,LIN Yu,WANG Wen-dong,et al.A novel algorithm for link delay inference in the neteorks with load-balance routing[J].Journal of Software,2005,16(5):886-893.(in Chinese) 焦利,林宇,王文东,等.一种负载均衡网络中内部链路时延推测算法[J].软件学报,2005,16(5):886-893. [27] YAO Y,CAI W.Ad Hoc Network Measurement Based on Network Tomography:Theory,Technique,and Application[J].Journal of Networks,2010,5(6):666-674. [28] SHAH B,Trivedi B H.Artificial Neural Network based Intrusion Detection System:A Survey [J].International Journal of Computer Applications,2012,39(6):13-18. [29] KAO B,TU N N,HWANG I,et al.Auction-Based Bandwidth Allocation in Multi-Hop Wireless Ad Hoc Networks [J].Wireless Personal Communications,2012,66(2):473-488. [30] The network simulator—ns-2 .[2014-9-21] http://www.isi.edu/nsnam/ns. [31] HU Xi,WANG Xin,ZHANG Bin.Stability-oriented adaptive rou-ting overhead contral algorithm in MANETs[J].Computer Science,2014,41(3):100-104,123.(in Chinese) 胡曦,王鑫,张斌.MANETs面向稳定性的自适应路由开销控制算法[J].计算机科学,2014,41(3):100-104,123. [32] FEENEY L M,NILSSON V.Investigating the energy consumption of a wireless network interface in an ad hoc networking environment [C]∥Proc.of the IEEE INFOCOM,Anchorage.AK,USA,2001. [33] WANG Wei,WANG Hui-ran,WANG Bei-zhan,et al.Energy-aware and self-adaptive anomaly detection scheme based on network tomography in mobile ad hoc networks [J].Information Sciences,2013,220(1):580-602. [34] JIANG Yi-bo,WANG Yu-chen,WANG Wan-liang,et al.Performance analysis method for instrusion detection in MANETs based on machine learning algorithms[J].Computer Science,2013,0(11A):170-191.(in Chinese) 蒋一波,王鱼晨,王万良,等.一种基于机器学习的MANET网络入侵检测性能评估方法研究[J].计算机科学,2013,40(11A):170-191. |
No related articles found! |
|