A survey: Optimal node routing strategies in MANET
暂无分享,去创建一个
[1] Eduardo da Silva,et al. Towards a fully self-organized identity-based key management system for MANETs , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[2] P. M. Khilar,et al. CSRP: A Centralized Secure Routing Protocol for mobile ad hoc network , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.
[3] Shahbaz Akhtar Abid,et al. Exploiting 3D Structure for Scalable Routing in MANETs , 2013, IEEE Communications Letters.
[4] H. Hasbullah,et al. An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).
[5] Feng Zhao,et al. CSR: Classified Source Routing in Distributed Networks , 2018, IEEE Transactions on Cloud Computing.
[6] Laura Carrea,et al. Optimized hash for network path encoding with minimized false positives , 2014, Comput. Networks.
[7] Jaime C. Acosta,et al. Survivability prediction of ad hoc networks under attack , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[8] Gene Tsudik,et al. Privacy-Preserving Location-Based On-Demand Routing in MANETs , 2011, IEEE Journal on Selected Areas in Communications.
[9] Ankurkumar Patel. Group Mobility Model Based Proactive and Reactive Routing Protocol in MANET , 2012 .
[10] Ralf Steinmetz,et al. CBFR: Bloom filter routing with gradual forgetting for tree-structured wireless sensor networks with mobile nodes , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[11] Hermann Hellwagner,et al. A hybrid MANET-DTN routing scheme for emergency response scenarios , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[12] Teresa Maria Vazão,et al. Routing on large scale mobile ad hoc networks using bloom filters , 2014, Ad Hoc Networks.
[13] Ruoyu Wu,et al. Risk-Aware Mitigation for MANET Routing Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.
[14] Isaac Keslassy,et al. Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAM/DRAM Memory , 2015, IEEE Transactions on Parallel and Distributed Systems.
[15] Shrideep Pallickara,et al. Evaluating Geospatial Geometry and Proximity Queries Using Distributed Hash Tables , 2014, Computing in Science & Engineering.
[16] Teresa Maria Vazão,et al. HRAN - A Scalable Routing Protocol for Multihop Wireless Networks Using Bloom Filters , 2011, WWIC.
[17] Muneer O. Bani Yassein,et al. Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks , 2013, Int. J. Mob. Comput. Multim. Commun..
[18] Rafael Timóteo de Sousa Júnior,et al. Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..
[19] Ing-Ray Chen,et al. Scalable and efficient dual-region based mobility management for ad hoc networks , 2014, Ad Hoc Networks.
[20] Mohamed Slim Ben Mahmoud,et al. An ADS-B Based Secure Geographical Routing Protocol for Aeronautical Ad Hoc Networks , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.
[21] Iain Parris,et al. Privacy-enhanced social-network routing , 2012, Comput. Commun..
[22] Chen Yan. Distributed Hash Table Based Routing Algorithm for Wireless Sensor Networks , 2014, 2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications.
[23] Ditipriya Sinha,et al. CBSRP: Cluster based secure routing protocol , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).
[24] Enrique Alba,et al. Fast energy-aware OLSR routing in VANETs by means of a parallel evolutionary algorithm , 2012, Cluster Computing.
[25] Stefan Weber,et al. Below Cross-Layer: An Alternative Approach to Service Discovery for MANETs , 2012, ADHOCNETS.
[26] Laxmi Shrivastava,et al. Performance Evaluation of Routing Protocols in MANET with Different Traffic Loads , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[27] Danai Chasaki,et al. Identifying malicious behavior in MANET through data path information , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).
[28] Minglu Li,et al. H-Tree: An Efficient Index Structurefor Event Matching in Content-BasedPublish/Subscribe Systems , 2015, IEEE Transactions on Parallel and Distributed Systems.
[29] Mario Gerla,et al. Path Heuristics Using ACO for Inter-domain Routing in Mobile Ad Hoc and Sensor Networks , 2010, BIONETICS.
[30] David J. Fleet,et al. Fast Exact Search in Hamming Space With Multi-Index Hashing , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[31] Frank T. Johnsen,et al. Distributed chat in dynamic networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.
[32] Roksana Boreli,et al. Improving the efficiency of anonymous routing for MANETs , 2012, Comput. Commun..
[33] Zahir Tari,et al. An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content , 2014, J. Netw. Comput. Appl..
[34] Rajesh Shrivastava,et al. Energy Consumption using Traffic Models for MANET Routing Protocols , 2011 .