Study on Reliable and Secure Routing Protocols on Manet
暂无分享,去创建一个
[1] Arun Kumar Sangaiah,et al. Efficient Bandwidth Utilization with Congestion Control for Wireless Mesh Networks , 2014 .
[2] Nei Kato,et al. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[3] A. Sumathi,et al. An ANN Approach in Ensuring CIA Triangle using an Energy based Secured Protocol E-AODV for Enhancing the Performance in MANETS , 2015 .
[4] M. K. Soni,et al. A Comparative Study for Secure Routing in MANET , 2010 .
[5] Victor C. M. Leung,et al. Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.
[6] V. Vijay Anand,et al. Methodologies for Addressing the Performance Issues of Routing in Mobile Ad hoc Networks: A Review , 2015 .
[7] Nei Kato,et al. A Dynamic Anomaly Detection Scheme for AODV-Based Mobile Ad Hoc Networks , 2009, IEEE Transactions on Vehicular Technology.
[8] P. C. Kishore Raja,et al. Performance Metrics of Wormhole Detection using Path Tracing Algorithm , 2015 .
[9] Alex Hinds,et al. A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET) , 2013 .
[10] B. Thenral,et al. AMRA: Angle based Multicast Routing Algorithm for Wireless Mesh Networks , 2015 .
[11] K. Chitra,et al. Multi Hop Secure Adhoc Network to Eradicate Cooperative Diversity , 2013 .
[12] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[13] Erman Ayday,et al. An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.
[14] Madjid Merabti,et al. Lightweight Sybil Attack Detection in MANETs , 2013, IEEE Systems Journal.
[15] Christeena Joseph,et al. Performance Evaluation of MANETS under Black Hole Attack for Different Network Scenarios , 2015 .
[16] K. Thangadurai,et al. Detection of Black Hole Attack in Mobile Ad-hoc Networks using Ant Colony Optimization – simulation Analysis , 2015 .
[17] Mohammad S. Obaidat,et al. FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems , 2011, IEEE Systems Journal.
[18] Shikha Jain. Security Threats in MANETS : A Review , 2014, ArXiv.