Energy Efficient Routing Protocol for Mobile Ad hoc Networks using Trust Based Security
暂无分享,去创建一个
[1] Kari Sentz,et al. Combination of Evidence in Dempster-Shafer Theory , 2002 .
[2] Edwin Hsing-Mean Sha,et al. Impact of trust model on on-demand multi-path routing in mobile ad hoc networks , 2013, Comput. Commun..
[3] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[4] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[6] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[7] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[8] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[9] Anupam Joshi,et al. Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..
[10] Thomas M. Chen,et al. Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.
[11] T. Jayanthy,et al. An Analysis of Various Parameters in Wireless Sensor Networks Using Adaptive FEC Technique , 2010 .
[12] Nidal Nasser,et al. The significant impact of a set of topologies on wireless sensor networks , 2012, EURASIP J. Wirel. Commun. Netw..
[13] Ayman I. Kayssi,et al. TRACE: A centralized Trust And Competence-based Energy-efficient routing scheme for wireless sensor networks , 2011, 2011 7th International Wireless Communications and Mobile Computing Conference.
[14] Chin Choy Chai,et al. Constrained power allocation algorithm for rate adaptive MIMO system , 2004, Eighth IEEE International Symposium on Spread Spectrum Techniques and Applications - Programme and Book of Abstracts (IEEE Cat. No.04TH8738).
[15] Ajay koul,et al. A system level security for Mobile Ad hoc Networks , 2011, 2011 3rd International Conference on Computer Research and Development.
[16] Li Xu,et al. Subdividing Hexagon-Clustered Wireless Sensor Networks for Power-Efficiency , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[17] Nathalie Mitton,et al. Energy-Aware Georouting with Guaranteed Delivery in Wireless Sensor Networks with Obstacles , 2009, Int. J. Wirel. Inf. Networks.
[18] D. K. Lobiyal,et al. THROUGHPUT ANALYSIS OF POWER CONTROL B- MAC PROTOCOL IN WSN , 2012 .
[19] Taruna Sikka,et al. Enhance Throughput in Wireless Sensor Network Using Topology Control Approach , 2012 .
[20] Chong-Kwon Kim,et al. Flooding in wireless ad hoc networks , 2001, Comput. Commun..
[21] S. Neelavathy Pari,et al. Requisite trust-based Secure Routing Protocol for MANETs , 2012, 2012 International Conference on Recent Trends in Information Technology.
[22] Liu Fang,et al. An Energy-Efficient Clustering Technique for Wireless Sensor Networks , 2008, 2008 International Conference on Networking, Architecture, and Storage.