Have a personal or library account? Click to login
Security architecture for the mobile ad hoc networks Cover

Security architecture for the mobile ad hoc networks

By: Jozef Filipek and  Ladislav Hudec  
Open Access
|Jul 2018

References

  1. [1] S. Akram, I. Zubair and M. Islam, ”Fully distributed dynami- cally configurable firewall to resist DOS attacks MANET”, rev. Networked Digital Technologies, 2009, NDT ’09.First International Conference, Ostrava, 2009.10.1109/NDT.2009.5272096
  2. [2] M. K.A. D. ??? Alicherry, ”Distributed Policy Enforcement Ar- chitecture for MANETs”, Diploma work ???.
  3. [3] M. Alicherry, A. Keromytis and A. Stavrou, ”Evaluating a col- laborative defense architecture for MANETs”, Rev. Internet Multimedia Services Architecture and Applications (IMSAA), 2009, IEEE International Conference, Bangalore, 2009.10.1109/IMSAA.2009.5439498
  4. [4] R. Boppana and X. Su, ”On the Effectiveness of Monitoring for Intrusion Detection Mobile Ad Hoc Networks”, 2011.10.1109/TMC.2010.210
  5. [5] A. Boukerche, K. El-Khatib, L. Xu and L. Korba, ”SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks”, 2004.10.1016/j.comcom.2004.07.019
  6. [6] A. Chaudhary, V. Tiwari and A. Kumar, ”Design an anomaly based fuzzy intrusion detection system for packet dropping at- tack mobile ad hoc networks”, Gurgaon, 2014.10.1109/IAdCC.2014.6779330
  7. [7] D. Ismail and M. Jaafar, ”Mobile ad hoc network overview”, Melaka, 2007.10.1109/APACE.2007.4603864
  8. [8] L. Jin, Z. Zhang, D. Lai and H. Zhou, ”Implementing and Eval- uating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network”, Pomana, CA, 2006.10.1109/WTS.2006.334533
  9. [9] I. Khalil, S. Bataineh, L. Qubajah and A. Khreishah, ”Dis- tributed secure routing protocol for Mobile Ad-Hoc Networks”, Amman, 2013.10.1109/CSIT.2013.6588766
  10. [10] N. Noureldien, ”A novel taxonomy of MANET attacks”, Mar- rakech, 2015.10.1109/EITech.2015.7162947
  11. [11] L. Rajeswari, R. Annie and A. Kannan, ”Enhanced intrusion detection techniques for mobile ad hoc networks”, Tamil Nadu, 2007.10.1049/ic:20070757
  12. [12] S. Saha, R. Chaki and N. Chaki, ”A New Reactive Secure Rout- ing Protocol for Mobile Ad-Hoc Networks”, Ostrava, 2008.10.1109/CISIM.2008.13
  13. [13] B. Sun, L. Osborne, Y. Xiao and S. Guizani, ”Intrusion detection techniques mobile ad hoc and wireless sensor networks”,.
  14. [14] S. Uyyala and D. Naik, ”Anomaly based intrusion detection of packet dropping attacks mobile ad-hoc networks”, Kanyaku- mari, 2014.10.1109/ICCICCT.2014.6993132
  15. [15] B. Vaidya, D. Makrakis and H. Mouftah, ”Provisioning secure on-demand routing protocol mobile ad hoc network”, Kath- mandu, 2011.10.1109/AHICI.2011.6113952
  16. [16] P. Vilhan and L. Hudec, ”Building Public Key Infrastructure for MANET with Help of BATMAN Advanced”, Rev. Modelling Symposium (EMS), 2013 European, Manchester, 2013.10.1109/EMS.2013.94
  17. [17] N. V. Vinh, H. Jun and M.-K. Kim, ”A Self-secure Routing Protocol for Large Mobile Ad hoc Networks”, Singapore, 2007.10.1109/WOCN.2007.4284230
  18. [18] H. Zhao and S. Bellovin, ”High Performance Firewalls MAN-ETs”, Rev. Mobile Ad-hoc and Sensor Networks (MSN), 2010 Sixth International Conference, Hangzhou, 2010.
  19. [19] L. Zhitang and S. Shudong, ”A Secure Routing Protocol for Mobile Ad hoc Networks”, Melbourne, Qld., 2007.10.1109/ICIS.2007.43
  20. [20] D. Watkins and C. Scott, ”Methodology for evaluating the effec- tiveness of intrusion detection tactical mobile ad-hoc networks”, 2004.
  21. [21] J. Filipek and L.Hudec ”Distributed firewall using PKI mo- bile Ad Hoc networks”, Proceedings of the 16-th International Conference on Computer Systems and Technologies, CompSys-Tech’15.
DOI: https://doi.org/10.2478/jee-2018-0026 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 198 - 204
Submitted on: Mar 22, 2018
|
Published on: Jul 28, 2018
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2018 Jozef Filipek, Ladislav Hudec, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.