40. امنیتMANETپیشنهادی روش مسیریابیMANET MANET
نتایجآینده کارهای
3از30
نامه پایان از مستخرج مقاالت
گیری نتیجه
مستخرج مقاالت
• A. Haghighi, S. Hajiramezan, and K. Mizanian, “Providing a
new method to deal with the Byzantine attack in intrusion
detection system with dynamic hierarchy in MANETs” (in
Persian), Second National Conference on Applied
Research in Computer & Information Technology.
CIVILICA, 2014.
• A. Haghighi, K. Mizanian, and G. Mirjalily, “Modified CBDS
for defending against collaborative attacks by malicious
nodes in MANETs.” IEEE 2015, 2nd International
Conference on Knowledge-Based Engineering and
Innovation (KBEI). IEEE, 2015.
40از43
41. منابع
29از30 41از43
• Toh, Chai K. Ad hoc mobile wireless networks: protocols and systems.
Pearson Education, 2001.
• Perkins, Charles, Elizabeth Belding-Royer, and Samir Das. Ad hoc on-demand
distance vector (AODV) routing. No. RFC 3561. 2003.
• Johnson, David, Y. Hu, and D. Maltz. The dynamic source routing protocol
(DSR) for mobile ad hoc networks for IPv4. No. RFC 4728. 2007.
• Jhaveri, Rutvij H. "MR-AODV: A solution to mitigate blackhole and grayhole
attacks in AODV based MANETs." Advanced Computing and Communication
Technologies (ACCT), 2013 Third International Conference on. IEEE, 2013.
• Chang, Jian-Ming, et al. "Defending against collaborative attacks by malicious
nodes in MANETs: A cooperative bait detection approach." Systems Journal,
IEEE 9.1 (2015): 65-75.