[1] | Rutvij H. Jhaveri, Sankita J. Patel and Devesh C. Jinwala, “A Novel Solution for Gray hole Attack in AODV Based MANETs”, In Proc. of Third International Conference on Advances in Communication, Network and Computing: Springer, February 2012. pp. 60-67. |
[2] | A. Boukerche, B. Turgut, N. Aydin, M. Ahmad, L. B¨ol¨oni, and D. Turgut, “Routing protocols in ad hoc networks: a survey of Computer Networks”, 2011, Vol. 55(13) pp. 3032–3080. |
[3] | Jeenat Sultana and Tasnuva Ahmed, “Securing AOMDV Protocol in Mobile Ad hoc Network with Elliptic Curve Cryptography”, International Conference on Electrical, Computer and Communication Engineering (ECCE), @2017, IEEE, pp.539-543. |
[4] | Sagar R Deshmukh, P N Chatur and Nikhil B Bhople, “AODV-Based Secure Routing Against Black hole Attack in MANET”, IEEE International Conference on Recent Trends in Electronics Information Communication Technology, @2016, IEEE, pp.1960-1964. |
[5] | Soufiene Djahel, Farid Na¨ıt-abdesselam, and Zonghua Zhang, “Mitigating Packet Dropping Problem in Mobile Ad Hoc Networks: Proposals and Challenges”, IEEE Communications Surveys & Tutorials, 2011. |
[6] | Abdelshafy M. A. and King P. J. B., “Resisting Black hole Attacks on MANETs”, 13th IEEE Annual Consumer Communications & Networking Conference (CCNC), @IEEE 2016. |
[7] | Bao, F., Chen, R., Chang, M., and Cho, J.-H., “Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. Network and Service Management”, @IEEE 2012, 9, pp. 169-183. |
[8] | Denko, M. K., Sun, T., and Woungang, I., “Trust management in ubiquitous computing: A Bayesian approach. Computer Communications”, 2015, 34, pp. 398-406. |
[9] | Cho, J.-H., Swami, A., and Chen, R., “A survey on trust management for mobile ad hoc networks, Communications Surveys & Tutorials”, @IEEE 2011, 13, pp. 562-583. |
[10] | Abd El-Haleem, A. M., and Ali, I., A., “TRIDNT: The Trust-Based Routing Protocol with Controlled Degree of Node Selfishness for MANET”, International Journal of Network Security & Its Applications (IJNSA), 2011, 3(3), pp.189-204. |
[11] | Airehrour, D., Gutierrez, J., and Ray, S. K., “GradeTrust: A Secure Trust Based Routing Protocol For MANETs. International Telecommunication Networks and applications Conference (ITNAC), 2015, 65-70, DOI: 10.1109/ATNAC.2015.7366790. |
[12] | Sultana, J., and Ahmed, T., “Securing AOMDV Protocol in Mobile Ad hoc Network with Elliptic Curve Cryptography”, IEEE International Conference on Electrical, Computer and Communication Engineering (ECCE), 2017, pp. 539-543. |
[13] | Sreenath N., Amuthan A., and Selvigirija P., “Countermeasures against Multicast Attacks on Enhanced-On Demand Multicast Routing Protocol in MANETs”, International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, © 2012 IEEE. |
[14] | Jhaveri R. H., “MR-AODV: A Solution to Mitigate Black hole and Gray hole Attacks in AODV Based MANETs”, 3rd International Conference on Advanced Computing & Communication Technologies. © 2013 IEEE, DOI 10.1109/ACCT.2013.6, pp. 254-260. |
[15] | Gupta S. and Woungang I., ”Trust-Based Security Protocol against Black hole Attacks in Opportunistic Networks”, 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), ©2013 IEEE, pp. 724-729. |
[16] | Arya N., singh U. and singh S, “Detecting and Avoiding of Worm Hole Attack and Collaborative Black hole attack on MANET using Trusted AODV Routing Algorithm”, IEEE International Conference on Computer, Communication and Control (IC4-2015), 2015, pp. 205-210. |
[17] | Woungang I., Dhurandher S. K., Peddi R. D., and Obaidat M. S., “Detecting Blackhole Attacks on DSR-based Mobile Ad Hoc Networks”, ©2012 IEEE. pp. 102-107. |
[18] | NS-3 (version 3.25), https://www.nsnam.org (accessed 30 November 2019). |
[19] | NS3 official website, https://www.nsnam.org/ (accessed 24 January 2020). |
[20] | Shankaran, R., Varadharajan, V., Orgun, M. A., and Hitchens, M., “Context aware trust management for peer-to-peer mobile ad-hoc networks”, Presented in 33rd Annual IEEE International Conference in Computer Software and Applications, 2009 2, 188-193. |
[21] | Jain, A., Prajapati, U., and Chouhan, P., “Trust based mechanism with AODV protocol for prevention of black-hole attack in MANET scenario”, In Proceedings of the 2016 Symposium on Colossal Data Analysis and Networking, CDAN 2016, Indore, India. |