[1]
|
Sari, A. and Necat, B. (2012) Securing Mobile Ad Hoc Networks against Jamming Attacks through Unified Security Mechanism. International Journal of Ad Hoc, Sensor and Ubiquiotus Computing, 3, 79-94.
http://dx.doi.org/10.5121/ijasuc.2012.3306
|
[2]
|
Ju, K. and Chung, K. (2012) Jamming Attack Detection and Rate Adaptation Scheme for IEEE 802.11 Multi Hop Tactical Networks. International Journal of Security and Its Applications, 6, 149-154.
|
[3]
|
Nguyan, D., Zhao, L., Uisawang, P. and Platt, J. (2000) Security Routing Analysis for Mobile Ad-Hoc Networks. Interdisciplinary Telecommunications Program of Colorado University.
|
[4]
|
Habib, A., Hefeeda, M. and Bhargava, B. (2003) Detecting Service Violations and DoS Attacks. The 10th Annual Network and Distributed System Security Symposium, San Diego, 177189.
|
[5]
|
Lackner, G. (2013) Comparison of Security in Wireless Network Standards with a Focus on Bluetooth, WiFi, and WiMAX. International Journal of Network Security, 15, 420-436.
|
[6]
|
Jain, R. and Nguyen, T. (2009) A Survey of WiMAX Security Threats. Project Report.
|
[7]
|
Li, W.J., Parker, J. and Joshi, A. (2012) Security through Collaboration and Trust in MANETs. Mobile Networks & Applications, 17, 342. http://dx.doi.org/10.1007/s11036-010-0243-9
|
[8]
|
Samreen, S. and Narasimha, G. (2013) An Efficient Security Mechanism to Detect Packet Droppers in a MANET under Individual and Collusive Adversarial Models. International Journal of Computer Applications, 82, 39.
|
[9]
|
Mandal, J.K. and Lutful Hassan, K. (2013) A Novel Technique to Detect Intrusion in MANET. International Journal of Network Security & Its Applications, 5, 179. http://dx.doi.org/10.5121/ijnsa.2013.5515
|
[10]
|
Padmaja, G.M. and Lakshmi, Ch.R. (2012) Analyzing the Detection of Active Attacks in Wireless Mobile Networks. International Journal of Reviews in Computing, 9, 34.
|
[11]
|
Shah, V. and Modi, N.K. (2012) A Comparative Analysis of Network Layer Threats & Defense Mechanisms of MANETs. International Journal of Advanced Research in Computer Science, 3, 160.
|
[12]
|
Sari, A. and Necat, B. (2012) Impact of RTS Mechanism on TORA and AODV Protocols’s Performance in Mobile Ad Hoc Networks. International Journal of Science and Advanced Technology, 2, 188-191.
|
[13]
|
Xu, W., Trappe, W., Zhang, Y. and Wood, T. (2005) The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Proceedings of 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Illinois, 25-27 May 2005.
|
[14]
|
OPNET Corporation www.opnet.com
|
[15]
|
Cavin, D., Sasson, Y. and Schiper, A. (2002) On the Accuracy of MANET Simulators. Proceedings of the 2nd ACM International Workshop on Principles of Mobile Computing, ACM Press, Toulouse, 38-43.
http://dx.doi.org/10.1145/584490.584499
|