An enhanced performance through agent-based secure approach for mobile ad hoc networks
暂无分享,去创建一个
[1] Yuan Gao,et al. Fuzzy logic-based dynamic routing management policies for mobile ad hoc networks , 2005, HPSR. 2005 Workshop on High Performance Switching and Routing, 2005..
[2] Dongman Lee,et al. An Adaptive Hello Messaging Scheme for Neighbor Discovery in On-Demand MANET Routing Protocols , 2013, IEEE Communications Letters.
[3] A. Hellany,et al. Wireless Ad-hoc networks: Using fuzzy trust approach to improve security between nodes , 2009, 2009 International Conference on Computer Engineering & Systems.
[4] Ashutosh Kumar Singh,et al. An optimised fuzzy clustering for wireless sensor networks , 2014 .
[5] Subramaniam Shamala,et al. Adaptive Optimizing of Hello Messages in Wireless Ad-Hoc Networks , 2007, Int. Arab J. Inf. Technol..
[6] Mahesh Motwani,et al. REVIEW OF WEIGHTED CLUSTERING ALGORITHMS FOR MOBILE AD HOC NETWORKS , 2012 .
[7] Yacine Challal,et al. Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..
[8] Baolin Sun,et al. Fuzzy Controllers Based Multipath Routing Algorithm in MANET , 2012 .
[9] Ji Luo,et al. An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks , 2006, Fuzzy Sets Syst..
[10] Bradford W. Parkinson,et al. Global positioning system : theory and applications , 1996 .
[11] Yueh-Ming Huang,et al. Fuzzy logic weighted multi-criteria of dynamic route lifetime for reliable multicast routing in ad hoc networks , 2008, Expert Syst. Appl..
[12] Michael P. Howarth,et al. Protection of MANETs from a range of attacks using an intrusion detection and prevention system , 2013, Telecommun. Syst..
[13] Siegfried Gottwald,et al. Fuzzy sets and formal logics , 2015, Fuzzy Sets Syst..
[14] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, Ad Hoc Networks.
[15] C. Palanisamy,et al. Overview of AODV , DSDV and RWMM 3 . 1 Ad Hoc on-demand distance vector routing ( AODV ) , 2018 .
[16] Roopam Gupta,et al. Performance optimisation through EPT-WBC in mobile ad hoc networks , 2016 .
[17] Ashutosh Kumar Singh,et al. Fuzzy logic based clustering in wireless sensor networks: a survey , 2013 .
[18] Bhupendra Verma,et al. An efficient proactive artificial immune system based anomaly detection and prevention system , 2016, Expert Syst. Appl..
[19] Seema Bawa,et al. A systematic review on routing protocols for Vehicular Ad Hoc Networks , 2014, Veh. Commun..
[20] Girish Katkar,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.
[21] Sumit Ghosh,et al. A survey of recent advances in fuzzy logic in telecommunications networks and new challenges , 1998, IEEE Trans. Fuzzy Syst..
[22] Qiang Liu,et al. A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[23] T. Ross. Fuzzy Logic with Engineering Applications , 1994 .
[24] D. Pesch,et al. Multi-metric routing decisions for ad hoc networks using fuzzy logic , 2004, 1st International Symposium onWireless Communication Systems, 2004..
[25] Aikaterini Mitrokotsa,et al. Evaluation of classification algorithms for intrusion detection in MANETs , 2012, Knowl. Based Syst..
[26] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[27] Rui Dinis,et al. The Impact of Node's Mobility on Link-Detection Based on Routing Hello Messages , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[28] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..
[29] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[30] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[31] Roopam Gupta,et al. Scalability enhancement of AODV using local link repairing , 2014 .
[32] Wenke Lee,et al. Attack Analysis and Detection for Ad Hoc Routing Protocols , 2004, RAID.
[33] Indranil Sengupta,et al. STACRP: a secure trusted auction oriented clustering based routing protocol for MANET , 2012, Cluster Computing.
[34] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.