منابع:

[1] Kale A., Ruchia Ms., and Gupta SR., “An Overview of    MANET Ad Hoc Network,” International Journal of Computer Science and Applications, vol. 6, no. 2, pp. 257-264, 2013.

[2] Singh G., and Singh J., “MANET: A Study of Challenges and Routing Principles,” International Journal of Advanced and Innovative Research, vol. 1, no. 1, pp. 514-523, 2012.

[3] Bakshi A., Sharma A.K., and Mishra A., “Significance of Mobile Ad-Hoc Networks (MANETS),” International Journal of Innovative Technology and Exploring Engineering, vol. 2, no. 4, pp. 899-912, 2013.

[4] Tai W.Y., Tan C.T., and Lau S.P., “Towards Utilizing Flow Label IPv6 in Implicit Source Routing for Dynamic Source Routing (DSR) in Wireless Ad Hoc Network,” Computers & Informatics (ISCI) on IEEE Symposium, pp. 101-106, 2017.

[5] Cerri D.,Ghioni A., “Securing AODV: the A-SAODV secure routing prototype” Communications Magazine in IEEE, pp. 120-125, vol. 46, Issue 2, 2016.

[6] Perkins C. E., and Bhagwat P., “Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers” Conference on Communications Architectures, Protocols and Applications, pp. 234-224, 2015.

[7] Nicola Milanovic et al, “Routing and Security in Mobile Ad Hoc Networks“,IEEE Computer, vol. 37, no. 2, pp. 61-65, 2014.

[8] Bridget Dahill et al, “A Secure Routing Protocol for Ad Hoc Networks,” MobiCom 2012, Atlanta, Georgia, USA, September 23-28, 2012.

[9] Yih-Chun Hu and Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routing,” IEEE Security and Privacy 2004, Editorial Calendar, vol. 2, no. 3, PP. 94-105, May/June 2014.

[10] Stefano Basagni et al, Mobile Ad-hoc Networking, IEEE press, John Wiley and Sons publication, PP. 329-354, 2004.

[11] Yih-Chun Hu, et al, “Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols,” Proceedings of the 2003 ACM workshop on Wireless security, San Diego, USA, pp. 30-40, 2013.

[12] S. B. S. Jamali, “A Survey over Black hole Attack Detection in Mobile Ad hoc Network,” International Journal of Computer Science and Network Security, vol. 15, pp. 44-51, 2015.

[13] Panagiotis Papadimitratos and Zygmunt J. Haas, “Secure Routing for Mobile Ad hoc Networks,” SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2012.

[14] Stephen Carter and Alec Yasinsac, “Secure Position Aided Ad hoc Routing,” Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), Nov 3-4, 2012.

[15] S. Zhu, S. Xu, S. Setia and S. Jajodia, “LHAP: A lightweight network access control protocol for ad hoc networks,” Ad Hoc Networks, vol. 4, no. 5, pp. 567-585, Sep. 2016.

بدون دیدگاه

ارسال دیدگاه

ورود به سایت

خوش آمدید! وارد حساب کاربری خود شوید

بخاطر بسپار فراموشی رمز عبور ؟

آیا حساب کاربری ندارید.؟ عضویت

Lost Password

عضویت