Contents & References of A new packet trap based algorithm to detect black hole attack in ad hoc networks
List:
Abstract.. 1
Chapter One: General Research
1-1 Introduction 3
1-2 Statement of Problem 5
1-3 Importance and necessity of research. 7
1-4 research objectives. 7
1-5 Hypotheses 7
Chapter Two: Review of Research Literature and Research Background
2-1 Intrusion Detection Systems 9
2-1-1 History of Intrusion Detection Systems 9
2-1-2 Architecture of Intrusion Detection Systems 12
2-1-3 Information Receiving Methods. 13
2-1-4 Analysis methods. 14
2-1-5 Timing. 15
2-1-6 Response methods. 15
2-1-7 System control. 16
2-1-8 Information sources. 17
2-1-8-1 Network-based system information sources. 19
2-1-9 analysis and intrusion detection techniques 20
2-1-10 response techniques. 21
2-2 mobile networks 23
2-2-1 networks with infrastructure. 25
2-2-2 networks without infrastructure. 26
2-3 mobile ad hoc network 27
2-3-1 history of mobile ad hoc networks 28
2-3-2 features and characteristics of mobile ad hoc networks. 29
2-3-2 routing in mobile ad hoc networks 33
2-3-2-1 routing protocols. 34
2-3-3 Applications of mobile ad hoc networks 40
2-3-4 Security in mobile ad hoc networks 42
2-3-4-1 Characteristics of a secure system. 42
2-3-4-2 cycle of security. 43
2-3-4-3 security problems in mobile ad hoc networks 44
2-3-4-4 types of attacks in mobile ad hoc networks 45
2-4 Research background. 54
Chapter Three: Research Implementation Method
Introduction.. 60
3-1 First Phase.. 61
3-2 Second Phase 63
3-3 Third Phase 66
Chapter Four: Data Analysis
4-1 NS software. 68
4-2 characteristics of the simulated network. 69
4-3 evaluated parameters. 70
4-4 Results.. 71
4-5 Data Analysis. 75
4-5-1 Average packet loss rate 75
4-5-2 Network throughput. 76
4-5-3 total network delay 77
4-5-4 normal routing times. 78
Chapter Five: Conclusions and Suggestions
5-1 Conclusion. 81
5-2 suggestions. 86
Resources and sources.. 87
Appendices 91
English abstract. 104
Source:
Persian sources
[1] Hafizpour, Hadith. (2011). Presenting a new algorithm to detect black hole attack in AODV routing. Master's thesis in computer engineering, software orientation. Faculty of Technical Engineering. Islamic Azad University. Science and Research Unit.
[2] Kargar, H.R. Tasgardi, M. b. and Akbari, M. 2019. Comprehensive guide for ns-2 emulator software. Tehran: Naqos
English sources
[3] Alem Y.F, Xuan Z.C. (2010). "Preventing Black Hole Attack in Mobile Ad-hoc Networks Using Anomaly Detection". in: proc. IEEE Of the International Conference on Communication. 978-1-4244-5824-0.
[4] Anita, E.A.M., Vasudevan, V. (2010). "Blackhole Attack Prevention in Multicast Routing Protocols for Mobile Ad hoc networks using Certificate Chaining". Intl. Journal of Computer Applications.
[5] Basagni, S., Conti, M., Giordano, S. (2004). "Mobile Ad Hoc Networking". IEEE Press. ch10. ISBN: 0471373133.
[6] Clausen, T., Jacquet, P. (2003). "Optimized Link State Routing Protocol (OLSR)". IETF RFC3626.
[7] Djahel, S., Nait-Abdesselam, F., Khokhar, A. (2008). "An Acknowledgment-Based Scheme to Defend Against Cooperative Black Hole Attacks in Optimized Link State Routing Protocol". Proc. of the IEEE International Conference on Communications (ICC), pp. 2780–2785.
[8] Guardo, E., Morabito, G., Catania, G., Mursia, A., Battiati, F. (2014). "BRAVO: A Black-hole Resilient Ad-hoc on demand distance Vector routing for tactical communications". IEEE International Black Sea Conference on Communication and Networking.
[9] Gurley Bace, R. (2000). “Intrusion Detection”, Macmillan Technical Publishing.
[10] Hu, Y.C., Perrig, A. (2004). "A Survey of Secure Wireless Ad Hoc Routing". IEEEIEEE Security and Privacy. 2(3),28-39.
[11] Hu, Y.C., Perrig, A., Johnson, D.B. (2005). Ariadne: "A secure On-Demand Routing Protocol for AdHoc Networks". In Wireless Networks Journal. 11(1,2), 21-38
[12] Jain, S., Jain, M., Kandwal, H. (2010) “Advanced Algorithm for Detection and Prevention of Cooperative Black and Grayhole Attacks in Mobile Ad Hoc Networks”. Intl. Journal of Computer Applications 1(7):37–42.
[13] Kaur, J., Singh, B. (2014). "Detect and Isolate Black Hole Attack in MANET using AODV Protocol". International Journal of Advanced in Computer Engineering & Technology (IJARCET). [14] Kim, H., Eugene, H., Spafford, G. (1995). "The Design and Implementation of Tripwire: A File System Integrity Checker". Purdue University. [15] Kurosawa, S., Nakayama, H., Kato, N., Jamalipour, A., Nemoto, Y. (2007). "Detecting blackhole attack on AODV-based Mobile Ad Hoc Networks by dynamic learning method". International Journal of Network Security 5 (3) 338–346.
[16] Larsson, T., Hedman, N. (1998). "Routing Protocols in Wireless Ad-hoc Networks A Simulation Study". Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm. [17] Lundberg, J. (2000). Routing Security in Ad Hoc Networks. Seminar on Network Security". pp. 1-12.
[18] Luo, J., Fan, M., Ye, D. (2008). "Black Hole Attack Prevention Based on Authentication Mechanism". Proc. of the IEEE Singapore International Conference on Communication Systems (ICCS), pp. 173–177.
[19] Lu, S., Li, L., Lam, K-Y., Jia, L. (2009). "SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack". Proc. of Intl. Conference on Computational Intelligence and Security (CIS '09), Dec. 11-14, Beijing, China, pp. 421-425.
[20] Momen, A.M.A., Hamza, H.S., Saroit, I.A. (2010). "A Survey on security enhanced multicast routing protocols in Mobile Adhoc Networks". IEEE Conference. pp-262-268
[21] Mohanapriya, M., Krishnamurthi, I. (2013). "Modified DSR protocol for detection and removal of selective black hole attack in MANET". Elsevier Ltd. doi:10.1016-j.
[22] Murthy, S.R., Manoj, B.S. (2007). "Ad hoc Wireless Networks: Architectures and Protocols". Pearson Education. ISBN: 9788131759059.
[23] Papadimitratos, P., Zygmunt, J. (2002). "Secure Routing for Mobile Ad Hoc Networks". Proc. of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS).
[24] Perkins, C.E., Beliding-Royer, Das, S.E. (2004). "Ad hoc on-demand distance vector (AODV) routing". IETF Internet Draft. MANET working group.
[25] Perkins, C.E., Das, S.R., Royer, E.M. (2000). "Ad-Hoc on Demand Distance Vector (AODV)". http://www.ietf.org/internet-drafts/draft-ietf -manet-aodv-05.txt.
[26] Perkins, C.E., Belding-Royer, E.M., Das, S.R. (2003). Mobile Ad Hoc Networking Working Group. http://www.cs.ucsb.edu/Internet Draft/draft-ietf -manet-bcast-02.txt
[27] Perkins, E.C., Bhagwat, P. (1994). "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers". SIGCOMM .
[28] Person, M. (2000).“Mobile Agent Architectures”, Defense Research Establishments.
[29] Qabajeh, L.K., Kiah, L.M., Qabajeh, M.M. (2009). "A Qualitative Comparison of Position-Based Routing Protocols for Ad-Hoc Networks". IJCSN International Journal of Computer Science and Network Security.
[30] Raja Mahmood, R.A., Khan, A.I. (2007). "A Survey on Detecting Black Hole Attack in AODV-based Mobile Ad Hoc Networks". in: Proc. of the International Symposium on High Capacity Optical Networks and Enabling Technologies (HONET), pp. 1–6.
[31] Roesch, M. (1999). "Snort - Light Weight Intrusion Detection for Networks". USENIX Association.
[32] Shurman, M.A., Yoo, S.M., Park, S. (2004).