F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs
暂无分享,去创建一个
Abdul Hanan Abdullah | Omprakash Kaiwartya | Hassan Chizari | Malik N. Ahmed | A. Abdullah | Omprakash Kaiwartya | Hassan Chizari | Malik N. Ahmed
[1] J. J. Garcia-Luna-Aceves,et al. PRIME: An Interest-Driven Approach to Integrated Unicast and Multicast Routing in MANETs , 2011, IEEE/ACM Transactions on Networking.
[2] Sundaravalli Narayanaswami,et al. Mobile adhoc networks: A simulation based security evaluation and intrusion prevention , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[3] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[4] Yoshiaki Tanaka,et al. Dempster-Shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs , 2014, 16th International Conference on Advanced Communication Technology.
[5] G. S. Bindra,et al. Detection and removal of co-operative blackhole and grayhole attacks in MANETs , 2012, 2012 International Conference on System Engineering and Technology (ICSET).
[6] K D R Assis,et al. Hybrid Algorithms for Routing and Assignment Wavelengths in Optical Networks , 2010, IEEE Latin America Transactions.
[7] Zehua Wang,et al. CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks , 2012, IEEE Journal on Selected Areas in Communications.
[8] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[9] Hussein A. Lafta,et al. Efficient Routing Protocol in the Mobile Ad-hoc Network (MANET) by using Genetic Algorithm (GA) , 2014 .
[10] R. Jaiswal,et al. Relative Cluster Entropy Based Wormhole Detection Using AOMDV in Adhoc Network , 2012, 2012 Fourth International Conference on Computational Intelligence and Communication Networks.
[11] Ji Guo,et al. A New Trust Management Framework for Detecting Malicious and Selfish Behaviour for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Ning Zhang,et al. A study on reservation-based adaptation for QoS in adversarial MANET environments , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[13] Vijay T. Raisinghani,et al. Load eqUilibrium Neighbor Aware Routing in Mobile Ad Hoc Network , 2014, 2014 Annual IEEE India Conference (INDICON).
[14] Dang Quan Nguyen,et al. A trust-based security architecture for tactical MANETS , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.
[15] Lyes Khoukhi,et al. Denial of Service (DoS) attacks detection in MANETs through statistical models , 2014, 2014 Global Information Infrastructure and Networking Symposium (GIIS).
[16] Basit Qureshi,et al. Collusion Detection and Prevention with FIRE+ Trust and Reputation Model , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[17] K P Manikandan,et al. A Survey on Attacks and Defense Metrics of Routing Mechanism in Mobile Ad hoc Networks , 2011 .
[18] Kalyani Handal,et al. Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning , 2018 .
[19] Miao Pan,et al. A Fair QoS-Aware Resource-Allocation Scheme for Multiradio Multichannel Networks , 2013, IEEE Transactions on Vehicular Technology.
[20] M.A. Gorlatova,et al. Detecting Wormhole Attacks in Mobile Ad Hoc Networks through Protocol Breaking and Packet Timing Analysis , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.
[21] Rahul Johari,et al. VAST: Volume adaptive searching technique for optimized routing in mobile ad-hoc networks , 2014, 2014 IEEE International Advance Computing Conference (IACC).
[22] B. Narasimhan,et al. A Reliable Flooding Mechanism for Mobile Ad-Hoc Networks , 2014, 2014 International Conference on Intelligent Computing Applications.
[23] Ben-Jye Chang,et al. Markov Chain-Based Trust Model for Analyzing Trust Value in Distributed Multicasting Mobile Ad Hoc Networks , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.
[24] Lyes Khoukhi,et al. Denial of service (DoS) attacks detection in MANETs using Bayesian classifiers , 2014, 2014 IEEE 21st Symposium on Communications and Vehicular Technology in the Benelux (SCVT).