Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimisation algorithm in MANETs
暂无分享,去创建一个
Mohammad S. Obaidat | Balaji Subbiah | Suthir Sriram | Rajesh Manoharn | Suresh Koneri Chandrasekaran
[1] Yueh-Min Huang,et al. Constructing secure group communication over wireless ad hoc networks based on a virtual subnet model , 2007, IEEE Wireless Communications.
[2] H. Vincent Poor,et al. Secrecy Throughput of MANETs Under Passive and Active Attacks , 2011, IEEE Transactions on Information Theory.
[3] Gene Tsudik,et al. ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2011, 2007 IEEE International Conference on Network Protocols.
[4] Hassan Khotanlou,et al. Fuzzy evolutionary cellular learning automata model for text summarization , 2016, Swarm Evol. Comput..
[5] Ming Yu,et al. AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments , 2014, IEEE Transactions on Vehicular Technology.
[6] Michael P. Howarth,et al. A Survey of MANET Intrusion Detection & Prevention Approaches for Network Layer Attacks , 2013, IEEE Communications Surveys & Tutorials.
[7] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[8] Theodore S. Rappaport,et al. Short-Range Wireless Communications for Next-Generation Networks: UWB, 60 GHz Millimeter-Wave WPAN, And ZigBee , 2007, IEEE Wireless Communications.
[9] Jeong Hyun Yi,et al. Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs , 2009, IEEE Transactions on Parallel and Distributed Systems.
[10] Guy Pujolle,et al. A survey of survivability in mobile ad hoc networks , 2009, IEEE Communications Surveys & Tutorials.
[11] Mohammad S. Obaidat,et al. Node Stability-Based Location Updating in Mobile Ad-Hoc Networks , 2008, IEEE Systems Journal.
[12] T. R. Reshmi,et al. Light weight cryptographic address generation (LW-CGA) using system state entropy gathering for IPv6 based MANETs , 2017, China Communications.
[13] J. M. Gnanasekar,et al. Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Wirel. Pers. Commun..
[14] Rui Zhang,et al. Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks , 2015, IEEE Transactions on Wireless Communications.
[15] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.
[16] Panagiotis Papadimitratos,et al. Secure data communication in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.