Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks

Firoz Ahmed, Seokhoon Yoon, Hoon Oh. Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks. In Ching-Hsien Hsu, Laurence Tianruo Yang, Jianhua Ma, Chunsheng Zhu, editors, Ubiquitous Intelligence and Computing - 8th International Conference, UIC 2011, Banff, Canada, September 2-4, 2011. Proceedings. Volume 6905 of Lecture Notes in Computer Science, pages 435-449, Springer, 2011. [doi]

@inproceedings{AhmedYO11,
  title = {Bullet-Proof Verification (BPV) Method to Detect Black Hole Attack in Mobile Ad Hoc Networks},
  author = {Firoz Ahmed and Seokhoon Yoon and Hoon Oh},
  year = {2011},
  doi = {10.1007/978-3-642-23641-9_35},
  url = {http://dx.doi.org/10.1007/978-3-642-23641-9_35},
  tags = {mobile},
  researchr = {https://researchr.org/publication/AhmedYO11},
  cites = {0},
  citedby = {0},
  pages = {435-449},
  booktitle = {Ubiquitous Intelligence and Computing - 8th International Conference, UIC 2011, Banff, Canada, September 2-4, 2011. Proceedings},
  editor = {Ching-Hsien Hsu and Laurence Tianruo Yang and Jianhua Ma and Chunsheng Zhu},
  volume = {6905},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-23640-2},
}