References
[1] Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, An analysis of Security Attacks found in Mobile Ad-hoc Network, International Journal of Advanced Research in Computer Science, Volume 5, No. 5, pp. 34-39, May-June 2014.
[2] Umesh Kumar Singh, Kailash Phuleria, Shailja Sharma & D.N. Goswami, A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks.
[3] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Communications Magazine, vol. 40, pp. 70-75, 2002
[4] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, 2004.
[5] L. Peters, F. De Turck, I. Moerman, B. Dhoedt, P. Demeester, and A. A. Lazar, "Network layer solutions for wireless shadow networks," Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, IC#/ICO#S/MCL`06, vol. 2006, p. 1628384, 2006.
[6] S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols," 2004.
[7] C.-C. Chiang, "Routing in Clustered Multihop, Mobile Wireless Networks with Fading Channel," Proc. /E€€ SlCON `97, Apr. 1997, pp. 197-211.
[8] B. Kannhavong, H. Nakayama, Y. Nemoto, N. Kato, A. Jamalipour. A survey of routing attacks in mobile ad hoc networks. Security in wireless mobile ad hoc and sensor networks, October 2007, page, 85-91.
[9] Z. Karakehayov, “Using REWARD to Detect Team Black- Hole Attacks in Wireless Sensor Networks,” Wksp. Real-World Wireless Sensor Networks, June 20–21, 2005.
[10] S. Lee, B. Han, and M. Shin, “Robust Routing in Wireless Ad Hoc Networks,” 2002 Int’l. Conf. Parallel Processing Wksps., Vancouver, Canada, Aug. 18–21, 2002.
[11] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, vol. 11, pp. 38-47, 2004.
[12] Shuyao Yu, Youkun Zhang, Chuck Song and Kai Chen, security architecture for Mobile Ad Hoc Networks”. http://www.portal.prozhe118.com, pp.1-4.
[13] L. Peters, F. De Turck, I. Moerman, B. Dhoedt, P. Demeester, and A. A. Lazar, "Network layer solutions for wireless shadow networks," Proceedings of the International Conference on networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, , vol. 2, 2006.
[14] S. A. Razak, S. M. Furnell, and P. J. Brooke, "Attacks against Mobile Ad Hoc Networks Routing Protocols," www.scm.tees.ac.uk, pp.-1-6, 2004.
[15] A. Mishra, Security and Quality of Service in Ad Hoc Wireless Networks, 2008.
[16] L. Tamilselvan and V. Sankaranarayanan, "Prevention of co-operative black hole attack in MANET," Journal of networks, vol. 3, pp. 13-20, 2008.
[17] H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless ad hoc networks," IEEE Communications Magazine, vol. 40, pp. 70-75, 2002.
[18] S. Saraeian, F. Adibniya, M. GhasemZadeh, and S. Abtahi, "Performance Evaluation of AODV Protocol under DDoS Attacks in MANET," Proceedings of World Academy of Science, Engineering and Technology, vol. Vol. 33, pp. 501 - 503, September 2008.
[19] Abolhasan, M., Wysocki, T., and Dutkiewicz, E. A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 2004, pp. 1–22.