Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks
暂无分享,去创建一个
[1] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[2] Mohammad S. Obaidat,et al. A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks , 2016, Secur. Commun. Networks.
[3] Azzedine Boukerche,et al. Joint authentication and quality of service provisioning in cooperative communication networks , 2012, Comput. Commun..
[4] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[5] Abderrahim Benslimane,et al. A secure and resistant architecture against attacks for mobile ad hoc networks , 2010, Secur. Commun. Networks.
[6] Juan-Carlos Cano,et al. An overview of anonymous communications in mobile ad hoc networks , 2012, Wirel. Commun. Mob. Comput..
[7] Chonggang Wang,et al. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks , 2013, Secur. Commun. Networks.
[8] Ossama Younis,et al. HEED: a hybrid, energy-efficient, distributed clustering approach for ad hoc sensor networks , 2004, IEEE Transactions on Mobile Computing.
[9] Ioannis Lambadaris,et al. Trust establishment in cooperative wireless relaying networks , 2014, Wirel. Commun. Mob. Comput..
[10] Ram Ramanathan,et al. Hierarchically‐organized, multihop mobile wireless networks for quality‐of‐service support , 1998, Mob. Networks Appl..
[11] Junzhou Luo,et al. A trust degree based access control in grid environments , 2009, Inf. Sci..
[12] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[13] Bo Wang,et al. A light-weight trust-based QoS routing algorithm for ad hoc networks , 2014, Pervasive Mob. Comput..
[14] Kai-Wei Ke,et al. Mobile awareness based cluster selection mechanisms in wireless ad hoc networks , 2004, IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004.
[15] Xiaoyan Hong,et al. Performance evaluation of anonymous routing protocols in MANETs , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[16] Sherali Zeadally,et al. Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.
[17] Haiying Shen,et al. ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs , 2011, IEEE Transactions on Mobile Computing.
[18] Jamal N. Al-Karaki,et al. Stimulating Node Cooperation in Mobile Ad hoc Networks , 2008, Wirel. Pers. Commun..
[19] Nei Kato,et al. Cluster-Based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks , 2013, IEEE Transactions on Parallel and Distributed Systems.
[20] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[21] Miss Laiha Mat Kiah,et al. A more secure and scalable routing protocol for mobile ad hoc networks , 2013, Secur. Commun. Networks.
[22] In-Young Ko,et al. AODV-RIP: improved security in mobile ad hoc networks through route investigation procedure , 2010 .
[23] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[24] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[25] Phillip Rogaway,et al. Nonce-Based Symmetric Encryption , 2004, FSE.
[26] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[27] Ming Gu,et al. Trust Based Routing for Misbehavior Detection in Ad Hoc Networks , 2010, J. Networks.
[28] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[29] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[30] Edwin Hsing-Mean Sha,et al. Impact of trust model on on-demand multi-path routing in mobile ad hoc networks , 2013, Comput. Commun..
[31] Tarek R. Sheltami,et al. EAACK—A Secure Intrusion-Detection System for MANETs , 2013, IEEE Transactions on Industrial Electronics.
[32] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[33] Anupam Joshi,et al. Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..
[34] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.