Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Jamalul-lail Ab Manan,et al. Group based access control scheme (GBAC): Keeping information sharing secure in mobile Ad- hoc environment , 2009, 2009 Fourth International Conference on Digital Information Management.
[2] Mohammad Atique,et al. Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network , 2010, 2010 Sixth International conference on Wireless Communication and Sensor Networks.
[3] Asmidar Abu Bakar,et al. Forming Trust in Mobile Ad Hoc Network , 2009, 2009 WRI International Conference on Communications and Mobile Computing.
[4] Gerd Kortuem,et al. When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[5] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[6] Yih-Chun Hu,et al. Enabling secure high-performance wireless ad hoc networking , 2003 .
[7] A. Pushpa. Trust based secure routing in AODV routing protocol , 2009, 2009 IEEE International Conference on Internet Multimedia Services Architecture and Applications (IMSAA).
[8] J.I. Agbinya,et al. Estimation of Trust Metrics for MANET Using QoS Parameter and Source Routing Algorithms , 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications (AusWireless 2007).
[9] S. P. Koh,et al. A routing protocol based on trusted and shortest path selection for mobile ad hoc network , 2009, 2009 IEEE 9th Malaysia International Conference on Communications (MICC).