Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] K.Selvavinayaki, K.K.Shyam Shankar And Dr.E.Karthikeyan, “Security Enhanced Dsr Protocol To Prevent Black Hole Attacks In Manetsâ€, International Journal Of Computer Applications Vol 7– No.11, October 2010, Pp.15-19. [2] Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, JohnDixon, and Kendall Nygard, “Prevention of Cooperative BlackHole Attack in Wireless Ad Hoc Networksâ€, 2003 International Conference on Wireless Networks (ICWN “03), Las Vegas,Nevada, USA. [3] E. A. Mary Anita and V. Vasudevan, Black Hole attack Prevention in multicast routing Protocols For MANETs Using Certificate Chaining, IJCA, Vol.1, No.12, pp. 22–29, 2010. [4] Tamilselvan, L. Sankaranarayanan, V. “Prevention of Black hole Attack in MANETâ€, Journal of Networks, Vol.3, No.5, May 2008. [5] D. Djenouri, L. Khelladi and N. Badache, A Survey of SecurityIssues in Mobile Ad Hoc and Sensor Networks, IEEE Communication Surveys & Tutorials, Vol. 7, No. 4, 2005. [6] Marti, S., Giuli, T. J., Lai, K., & Baker, M.(2000),Mitigating routing misbehavior in mobile ad-hoc networks, Proceedings of the6th International Conference on Mobile Computing and Networking (MobiCom), , pp. 255-265. [7] Yi-Chun Hu, Adrian Perrig, “A Survey of Secure Wireless Ad Hoc Routingâ€, IEEE Security and Privacy, 1540-7993/04/$20.00 © 2004 IEEE, May/June 2004. [8] Mahesh K. Marina Samir R. Das , On-demand Multipath Distance Vector Routingin Ad Hoc Networks- WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2006; 6:969–988Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/wcm.432. [9] Hesiri Weerasinghe and Huirong Fu, Member of IEEE, Preventing Cooperative Black Hole Attacks in Mobile Adhoc Networks: Simulation Implemention and Evaluation,IJSEA,Vol2,No.3,July 2008. [10] Yu, K.M, Yu, C.W, Yan, S.F. 2009. An Ad Hoc Routing Protocol with Multiple Backup Routes. In Proc. Springer Science+Business Media LLC. 1 November 2009 [11] Tsou P-C, Chang J-M, Lin Y-H, Chao H-C, Chen J-L(2011) Developing a BDSR Scheme to Avoid BlackHole Attack Based on Proactive and Reactive Architecture in MANETs. [12] NS2 tutorial, www.isi.edu/nsnam/ns/tutorial.
![]() | V2I512.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|