Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm for Multi Hop Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Sajal K. Das,et al. A trust-based framework for data forwarding in opportunistic networks , 2013, Ad Hoc Networks.
[2] K. Venkatachalapathy,et al. Increased Throughput for Load based Channel Aware Routing in MANETs with Reusable Paths , 2012 .
[3] Y. Harold Robinson,et al. Energy-Based Dynamic Encryption for Wireless Sensor Networks , 2011 .
[4] Robert Tappan Morris,et al. Opportunistic routing in multi-hop wireless networks , 2004, Comput. Commun. Rev..
[5] M. Rajaram,et al. ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service , 2016 .
[6] M. Rajaram,et al. SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks , 2016 .
[7] Llorenç Cerdà-Alabern,et al. Distance Progress Based Opportunistic Routing for wireless mesh networks , 2012, 2012 8th International Wireless Communications and Mobile Computing Conference (IWCMC).
[8] M. Rajaram,et al. Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring , 2016 .
[9] Wei Yu,et al. A Cross-Layer Optimization Framework for Multihop Multicast in Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] Antonio Iera,et al. The Internet of Things: A survey , 2010, Comput. Networks.
[11] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[12] S. Ramalakshmi,et al. ATMPH: Attaining Optimal Throughput Capacity of MANET with Power Control in Heterogeneous Network , 2014 .
[13] Jörg Widmer,et al. Contention-based forwarding for mobile ad hoc networks , 2003, Ad Hoc Networks.
[14] Azzedine Boukerche,et al. Towards a Comprehensive Model for Performance Analysis of Opportunistic Routing in Wireless Mesh Networks , 2015 .
[15] M. Rajaram,et al. A Memory Aided Broadcast Mechanism with Fuzzy Classification on a Device-to-Device Mobile Ad Hoc Network , 2016, Wirel. Pers. Commun..
[16] M. Rajaram,et al. Energy-Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks , 2015, TheScientificWorldJournal.
[17] Xiaodong Lin,et al. Secure and Reliable Routing Protocols for Heterogeneous Multihop Wireless Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[18] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[19] M. Rajaram,et al. Tree Based Data Fusion Clustering Routing Algorithm for Illimitable Network Administration in Wireless Sensor Network , 2016 .
[20] Mario Gerla,et al. Asynchronous multimedia multihop wireless networks , 1997, Proceedings of INFOCOM '97.
[21] S. Tamil Selvi,et al. Development of Energy Efficient Clustering Protocol in Wireless Sensor Network Using Neuro-Fuzzy Approach , 2016, TheScientificWorldJournal.
[22] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[23] M. Rajaram,et al. TBOR: Tree Based Opportunistic Routing for Mobile Ad Hoc Networks , 2016 .
[24] M. Rajaram,et al. Establishing Pairwise Keys Using Key Predistribution Schemes for Sensor Networks , 2015 .
[25] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[26] Robert Tappan Morris,et al. ExOR: opportunistic multi-hop routing for wireless networks , 2005, SIGCOMM '05.
[27] Wei Chen,et al. Optimal forwarder list selection in opportunistic routing , 2009, 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems.
[28] M. Rajaram,et al. A Novel Approach to Allocate Channels Dynamically in Wireless Mesh Networks , 2015 .
[29] V. Milutinovic,et al. A survey of military applications of wireless sensor networks , 2012, 2012 Mediterranean Conference on Embedded Computing (MECO).
[30] Sun-Yuan Kung,et al. Network planning in wireless ad hoc networks: a cross-Layer approach , 2005 .
[31] Yesudhas Harold Robinson,et al. Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN , 2016, Wireless Personal Communications.
[32] J. J. Garcia-Luna-Aceves,et al. An interest-driven approach to integrated unicast and multicast routing in MANETs , 2008, 2008 IEEE International Conference on Network Protocols.
[33] Niki Pissinou,et al. Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks , 2005, Mob. Networks Appl..
[34] Y. Harold Robinson,et al. An advanced controlled-flooding routing with group organization for Delay Tolerant Networks using A-SMART , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.
[35] M. Rajaram,et al. Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic , 2016 .
[36] Dario Pompili,et al. Underwater acoustic sensor networks: research challenges , 2005, Ad Hoc Networks.
[37] Andrea J. Goldsmith,et al. Cross-layer design of ad hoc networks for real-time video streaming , 2005, IEEE Wireless Communications.
[38] S. Tamil Selvi,et al. Opportunistic Routing with Secure Coded Wireless Multicast Using MAS Approach , 2014 .
[39] Lili Qiu,et al. SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks , 2009, IEEE Transactions on Mobile Computing.
[40] Mohammad S. Obaidat,et al. Trust-based Security Protocol against blackhole attacks in opportunistic networks , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).
[41] A. Ayyasamy,et al. Context Aware Adaptive Service based Dynamic Channel Allocation Approach for Providing an Optimal QoS over MANET , 2014 .
[42] Martin Vetterli,et al. Valuable Detours: Least-Cost Anypath Routing , 2011, IEEE/ACM Transactions on Networking.
[43] Srihari Nelakuditi,et al. On selection of candidates for opportunistic anypath forwarding , 2006, MOCO.
[44] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[45] Kirk Martinez,et al. Environmental Sensor Networks: A revolution in the earth system science? , 2006 .
[46] Luiz Filipe M. Vieira,et al. Performance and trade-offs of opportunistic routing in underwater networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[47] Bu-Sung Lee,et al. Position Based Opportunistic Routing for Robust Data Delivery in MANETs , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[48] M. Rajaram,et al. Trustworthy Link Failure Recovery Algorithm for Highly Dynamic Mobile Adhoc Networks , 2015 .
[49] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[50] Torsten Braun,et al. Performance evaluation of opportunistic routing protocols: a framework-based approach using OMNeT++ , 2012, LANC.
[51] Ayyasamy Ayyanar,et al. Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs , 2015, Wirel. Networks.
[52] Azzedine Boukerche,et al. An adaptive computational trust model for mobile ad hoc networks , 2009, IWCMC.