How to cite this paper
Hafizpour, H., zadeh, M & Mirabedini, S. (2013). Using Apriori algorithm to prevent black hole attack in mobile Ad hoc networks.Management Science Letters , 3(1), 351-358.
Refrences
Agrawal, R., Imielinski, T. & Swami, A. (1993). Mining association rules between sets of items in large databases. SIGMOD & apos; 93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data. 207–216.
Bansal, S. & Baker, M. (2003). Observation-based cooperation enforcement in ad hoc networks. Networking and Internet Architecture (cs.NI).
Buchegger, S., Tissieres, C. & Le Boudec, J.Y. (2003). A test bed for misbehavior detection in mobile ad-hoc networks -how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA.
Buchegger, S. & Le Boudec, J.Y. (2003). A robust reputation system for mobile ad hoc networks. Technical Report IC/2003/50, EPFL-DI-ICA.
Deng, H., Li, W. & Agarwal, D.P. (2002). Routing Security in Wireless Ad Hoc Networks. University of Cincinnati, IEEE Communications magazine. 40(10), 70 -75.
Hu, Y.C & Perrig, A. (2004). A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and
Privacy. 2(3),28-39.
Hu, Y.C, Perrig, A. & Johnson, D.B. (2005). Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks. In Wireless Networks Journal. 11(1,2), 21-38.
Hod, B. & Dolev, d. (2005). Cooperative and Reliable Packet-Forwarding On Top of AODV. A thesis on School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel.
Hegland, M. (2005). The apriori algorithm - tutorial, Technical report. WSPC/Lecture Notes Series: 9in x 6in In Australian National University.
Hongsong, C., Zhenzhou, J. & Mingzeng, H. (2006). A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition. In Asian Journal of InformationTechnology. 5(1), 54-60.
Jabas, A. (2011). MANET Mining: Mining Association Rules. Mobile Ad-Hoc Networks: Applications. ISBN: 978-953-307-416-0.
Karpijoki, V. (2000). Security in Ad Hoc Networks. Seminar on NetWork Security, HUT TML.
Larsson, T. & Hedman, N. (1998). Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm.
Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM). 255–265.
Michiardi, P. & Molva, R. (2002). Preventing denial of service and selfishness in ad hoc networks. In Conference Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland.
Michiardi, P. & Molva, R. (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference. 107–121.
Medadian, M., Yektaie, M.H. & Rahimi, A.M. (2009). Combat with Black hole attack in AODV routing protocol in MANET. First Asian Himalayas International Conference on Internet. 1-5.
Perkins, C.E., Das, S.R. & Royer, E.M. (2000). Ad-Hoc on Demand Distance Vector (AODV).
http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-05.txt.
Perkins, C.E., Belding-Royer, E.M. & Das, S.R. (2003). Mobile Ad Hoc Networking Working Group.http://www.cs.ucsb.edu/Internet Draft/draft-ietf-manet-bcast-02.txt.
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J. & Nygard, K. (2003). Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In Proc. of Int & apos; l Conf. on Wireless Networks.
Rezaei, M., Mirabedini, J., Latif Shabgahi, Gh., & Jalalvand, S. (2008). Improvement of AODV protocol using fuzzy protochol. 13th Conference in Electrical Engineering, Tehran, Iran.
Siva Ram Murthy, C. & Manoj, B.S. (2007). Ad hoc Wireless Networks: Architectures and Protocols. Pearson Education. ISBN: 9788131759059.
Wu, B., Chen, J., Wu, J. & Cardei, M. (2007). A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. WIRELESS/MOBILE NETWORK SECURITY. 103-135
Zhou, L. & Haas, Z.J. (1999). Securing Ad Hoc Networks. IEEE network, special issue on network security. 13(6), 24 – 30.
http://www.isi.edu/nsnam/ns/
Bansal, S. & Baker, M. (2003). Observation-based cooperation enforcement in ad hoc networks. Networking and Internet Architecture (cs.NI).
Buchegger, S., Tissieres, C. & Le Boudec, J.Y. (2003). A test bed for misbehavior detection in mobile ad-hoc networks -how much can watchdogs really do. Technical Report IC/2003/72, EPFL-DI-ICA.
Buchegger, S. & Le Boudec, J.Y. (2003). A robust reputation system for mobile ad hoc networks. Technical Report IC/2003/50, EPFL-DI-ICA.
Deng, H., Li, W. & Agarwal, D.P. (2002). Routing Security in Wireless Ad Hoc Networks. University of Cincinnati, IEEE Communications magazine. 40(10), 70 -75.
Hu, Y.C & Perrig, A. (2004). A Survey of Secure Wireless Ad Hoc Routing. IEEE Security and
Privacy. 2(3),28-39.
Hu, Y.C, Perrig, A. & Johnson, D.B. (2005). Ariadne: A secure On-Demand Routing Protocol for Ad Hoc Networks. In Wireless Networks Journal. 11(1,2), 21-38.
Hod, B. & Dolev, d. (2005). Cooperative and Reliable Packet-Forwarding On Top of AODV. A thesis on School of Engineering and Computer Science, The Hebrew University of Jerusalem, Israel.
Hegland, M. (2005). The apriori algorithm - tutorial, Technical report. WSPC/Lecture Notes Series: 9in x 6in In Australian National University.
Hongsong, C., Zhenzhou, J. & Mingzeng, H. (2006). A Novel Security Agent Scheme for Aodv Routing Protocol Based on Thread State Transition. In Asian Journal of InformationTechnology. 5(1), 54-60.
Jabas, A. (2011). MANET Mining: Mining Association Rules. Mobile Ad-Hoc Networks: Applications. ISBN: 978-953-307-416-0.
Karpijoki, V. (2000). Security in Ad Hoc Networks. Seminar on NetWork Security, HUT TML.
Larsson, T. & Hedman, N. (1998). Routing Protocols in Wireless Ad-hoc Networks - A Simulation Study. Masters thesis in computer science and engineering, Lulia University of Technology, Stockholm.
Marti, S., Giuli, T.J., Lai, K. and Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In mobile Computing and Networking (MOBICOM). 255–265.
Michiardi, P. & Molva, R. (2002). Preventing denial of service and selfishness in ad hoc networks. In Conference Working Session on Security in Ad Hoc Networks, Lausanne, Switzerland.
Michiardi, P. & Molva, R. (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference. 107–121.
Medadian, M., Yektaie, M.H. & Rahimi, A.M. (2009). Combat with Black hole attack in AODV routing protocol in MANET. First Asian Himalayas International Conference on Internet. 1-5.
Perkins, C.E., Das, S.R. & Royer, E.M. (2000). Ad-Hoc on Demand Distance Vector (AODV).
http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-05.txt.
Perkins, C.E., Belding-Royer, E.M. & Das, S.R. (2003). Mobile Ad Hoc Networking Working Group.http://www.cs.ucsb.edu/Internet Draft/draft-ietf-manet-bcast-02.txt.
Ramaswamy, S., Fu, H., Sreekantaradhya, M., Dixon, J. & Nygard, K. (2003). Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. In Proc. of Int & apos; l Conf. on Wireless Networks.
Rezaei, M., Mirabedini, J., Latif Shabgahi, Gh., & Jalalvand, S. (2008). Improvement of AODV protocol using fuzzy protochol. 13th Conference in Electrical Engineering, Tehran, Iran.
Siva Ram Murthy, C. & Manoj, B.S. (2007). Ad hoc Wireless Networks: Architectures and Protocols. Pearson Education. ISBN: 9788131759059.
Wu, B., Chen, J., Wu, J. & Cardei, M. (2007). A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. WIRELESS/MOBILE NETWORK SECURITY. 103-135
Zhou, L. & Haas, Z.J. (1999). Securing Ad Hoc Networks. IEEE network, special issue on network security. 13(6), 24 – 30.
http://www.isi.edu/nsnam/ns/