A unified approach for detecting and eliminating selfish nodes in MANETs using TBUT
暂无分享,去创建一个
Ayyaswamy Kathirvel | Jebakumar Josh Kumar | Namaskaram Kirubakaran | Perumal Sivaraman | Muthusamy Subramaniam
[1] Athanasios V. Vasilakos,et al. Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.
[2] Rengaramanujam Srinivasan,et al. ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks , 2011, Int. J. Commun. Networks Distributed Syst..
[3] Rengaramanujam Srinivasan,et al. ETUS: An enhanced triple umpiring system for security and performance improvement of mobile ad hoc networks , 2011, Int. J. Netw. Manag..
[4] Ayyaswamy Kathirvel. Introduction to Glomosim , 2011 .
[5] Rengaramanujam Srinivasan,et al. Triple Umpire System for Security of Mobile Ad Hoc Networks , 2009 .
[6] A. M. Kurkure. SELFISH NODE DETECTION TECHNIQUES IN MANET: A REVIEW , 2013 .
[8] C. Rajabhushanam,et al. System of One to Three Umpire Security System for Wireless Mobile Ad hoc Network , 2011 .
[9] Rengaramanujam Srinivasan,et al. A System of Umpires for Security of MANET , 2009 .
[10] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[11] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[12] L. Sudha Rani. DETECTION AND PREVENTION OF WORMHOLE ATTACK IN STATELESS MULTICASTING , 2012 .
[13] Tarik Taleb,et al. Combating Against Attacks on Encrypted Protocols , 2007, 2007 IEEE International Conference on Communications.
[14] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[15] A. Kathirvel,et al. Global Mobile Information System Simulator in Fedora Linux , 2009 .
[16] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[17] Jianhua Ma,et al. P2P soft security: On evolutionary dynamics of P2P incentive mechanism , 2011, Comput. Commun..
[18] Rengaramanujam Srinivasan,et al. Self Umpiring System for Security in Wireless Mobile Ad Hoc Network , 2010, Wirel. Sens. Netw..
[19] Shusen Yang,et al. A survey on the ietf protocol suite for the internet of things: standards, challenges, and opportunities , 2013, IEEE Wireless Communications.
[20] Rengaramanujam Srinivasan,et al. Performance Analysis of Propagation Model using Wireless Mobile Ad Hoc Network Routing Protocols , 2009 .
[21] Timothy X. Brown,et al. Jamming and sensing of encrypted wireless ad hoc networks , 2006, MobiHoc '06.
[22] Arya Megha,et al. Grayhole Attack and Prevention in Mobile Adhoc Network , 2011 .
[23] Chang-Wu Yu,et al. A Distributed and Cooperative Black Hole Node Detection and Elimination Mechanism for Ad Hoc Networks , 2007, PAKDD Workshops.
[24] Suresh Koneri Chandrasekaran,et al. Primary Path Reservation Using Enhanced Slot Assignment in TDMA for Session Admission , 2015, TheScientificWorldJournal.
[25] Athina Markopoulou,et al. Blacklisting Recommendation System: Using Spatio-Temporal Patterns to Predict Future Attacks , 2011, IEEE Journal on Selected Areas in Communications.
[26] Jameela Al-Jaroodi,et al. Towards more reliable and secure source routing in mobile ad hoc and sensor networks , 2014, Telecommun. Syst..
[27] Keren Bergman,et al. Inaugural Issue Editors' Introduction , 2009 .
[28] Sinjumol Thomas,et al. Anatomical Studies on Vitex Leucoxylon and Vitex Negundo (Verbenaceae) , 2014 .
[29] Manoj Duhan,et al. An effective implementation of security based algorithmic approach in mobile adhoc networks , 2014, Human-centric Computing and Information Sciences.
[30] Athanasios V. Vasilakos,et al. Delay Tolerant Networks: Protocols and Applications , 2011 .
[31] Athanasios V. Vasilakos,et al. CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding , 2012, 2012 Proceedings IEEE INFOCOM.
[32] Ayyaswamy Kathirvel. Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS , 2010, Int. J. Commun. Networks Inf. Secur..
[33] Michael K. Danquah,et al. The quintessential research world is progressively interdisciplinary , 2012 .
[34] A. K. Mousa,et al. Comment on “On Soft β-Open Sets and Soft β-Continuous Functions” , 2015, TheScientificWorldJournal.
[35] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[36] Ayyaswamy Kathirvel and Rengaramanujam Srinivasan. Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS , 2010 .
[37] Rengaramanujam Srinivasan,et al. Self _ USS : A Self Umpiring System for Security in Mobile Ad hoc Network , 2022 .
[38] Ayyaswamy Kathirvel,et al. A Study on Salvaging Route Reply for AODV Protocol in the Presence of Malicious Nodes , 2009 .
[39] Prashant B. Swadas,et al. Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet , 2009, ArXiv.
[40] Juan-Carlos Cano,et al. A Fast Model for Evaluating the Detection of Selfish Nodes Using a Collaborative Approach in MANETs , 2014, Wirel. Pers. Commun..
[41] G. Jyoshna,et al. REMOVAL OF BYZANTINE ATTACKS IN ADHOC NETWORKS , 2012 .
[42] Rengaramanujam Srinivasan,et al. A System of Umpires for Security of Wireless Mobile Ad Hoc Network , 2010, Int. Arab. J. e Technol..
[43] Naixue Xiong,et al. Nodes organization for channel assignment with topology preservation in multi-radio wireless mesh networks , 2012, Ad Hoc Networks.
[44] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[45] Athanasios V. Vasilakos,et al. Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.
[46] Athanasios V. Vasilakos,et al. Peer-to-Peer Media Streaming: Insights and New Developments , 2011, Proceedings of the IEEE.
[47] Athanasios V. Vasilakos,et al. Service configuration and traffic distribution in composite radio environments , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[48] Athanasios V. Vasilakos,et al. Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..
[49] Rengaramanujam Srinivasan,et al. Enchanced Self Umpiring System for Security Using Salvaging Route Reply , 2010 .
[50] Athanasios V. Vasilakos,et al. TB2F: Tree-bitmap and bloom-filter for a scalable and efficient name lookup in Content-Centric Networking , 2014, 2014 IFIP Networking Conference.
[51] Leena Sahu,et al. A Cooperative Approach for Understanding Behavior of Intrusion Detection System in Mobile Ad Hoc Networks , 2013 .
[52] S. K. Muthusundar,et al. Temporary Redundant Transmission Mechanism for SCTP Multihomed Hosts , 2015, TheScientificWorldJournal.
[53] Murthy J.V.R,et al. Text Document Classification based-on Least Square Support Vector Machines with Singular Value Decomposition , 2011 .
[54] Jiann-Liang Chen,et al. Developing a BDSR scheme to avoid black hole attack based on proactive and reactive architecture in MANETs , 2011, 13th International Conference on Advanced Communication Technology (ICACT2011).
[55] Naixue Xiong,et al. Comparative analysis of quality of service and memory usage for adaptive failure detectors in healthcare systems , 2009, IEEE Journal on Selected Areas in Communications.
[56] Athanasios V. Vasilakos,et al. Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.
[57] Kathirvel Ayyaswamy. Underwater Wireless Sensor Networks: Applications, Challenges and Design Issues of the Network Layer - A Review , 2015 .
[58] Leandros Tassiulas,et al. Resource Allocation and Cross Layer Control in Wireless Networks (Foundations and Trends in Networking, V. 1, No. 1) , 2006 .
[59] Bipin Bihari Jayasingh,et al. A Novel Metric for Detection of Jellyfish Reorder Attack on Ad Hoc Network , 2010 .
[60] Leandros Tassiulas,et al. Resource Allocation and Cross-Layer Control in Wireless Networks , 2006, Found. Trends Netw..