References
[1] Himadri Nath Saha , Dr. Debika Bhattacharyya , Dr. P. K.Banerjee ,Aniruddha Bhattacharyya ,Arnab Banerjee , Dipayan Bose “Study Of Different Attacks In Manet With Its Detection & Mitigation Schemes” International Journal of Advanced Engineering Technology IJAET/Vol.III/ Issue I/January-March, 2012/383-388.
[2] Yu-seung Kim, Heejo Lee, “On classifying and evaluating the effect of jamming attack”.
[3] Ali Hamieh, Jalel Ben-Othman., “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
[4] Dr. S. S. Tyagi, “Study of MANET: Characteristics, Challenges, Application and Security Attacks”, Volume 3, Issue 5, May 2013
[5] IIyas, M., “The hand book of ad -hoc wireless networks”, CRC press LLC. 2003.
[6] Broch,J., A.M David and B. David, “A Performance comparison of multi-hop wireless ad hoc network routing protocols”, Proc.IEEE/ACM MOBICOM’98, pp: 85-97. 1998.
[7] M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network,” Ericsson Review,No.4, , pp. 248-263. 2000.
[8] E. M. Royer and C-K Toh , “A review of Current routing protocols for Ad Hoc Mobile Wireless”.
[9] Y. Hu, D. Johnson and A Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wire”.
[10] D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks”, Ed., pp. 153-81. Kluwer, 1996.
[11] Belding-Royer,E.M. and C.K. Toh, “A review of current routing protocols for ad-hoc mobile wireless networks”,IEEE Personal Communication magazine pp:46-55. 1999.
[12] M. Frodigh, P. Johansson, and P. Larsson., “Wireless ad hoc networking: the art of networking without a network”, Ericsson Review,No.4, pp. 248-263. 2000.
[13] Snehita Modi, Dr. Paramjeet Singh, Dr. Shaveta Rani, “Performance Improvement of Mobile Ad hoc Networks under Jamming Attack”, (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4) , 2014, 5197-5200
[14] Gagandeep, Aashima, Pawan Kumar, “Analysis of Different Security Attacks in MANETs on Protocol Stack A-Review”, International Journal of Engineering and Advanced Technology (IJEAT), Volume-1, Issue-5, June 2012, pp.269-275.
[15] Mr. Vinod Mahor M.Tech Scholar , Information Technology,Mr. Sandeep Raghuwanshi, “Taguchi’s Loss Function Based Measurement of Mobile Ad-Hoc Network Parameters under AODV Routing Protocol”, IEEE – 31661 4th ICCCNT , Tiruchengode, India. - July 4-6, 2013
[16] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.
[17] Wenyuan Xu, Wade Trappe,Yanyong Zhang and Timothy Wood., “The feasibility of launching and detecting jamming attacks in wireless networks”.
[18] John Dunlop and Joan Cortes. “Impact of Directional Antennas in Wireless Sensor Networks.” pp.1-6, IEEE 2007.
[19] Ali Hamieh, Jalel Ben-Othman. “Detection of jamming attacks in wireless ad hoc networks using error distribution.” p.p.1-6,IEEE 2009.