A secure and energy efficient ant routing algorithm
暂无分享,去创建一个
[1] K. Scott,et al. Routing and channel assignment for low power transmission in PCS , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.
[2] Binod Kumar Pattanayak,et al. Power Aware Ad Hoc On-demand Distance Vector (PAAODV) Routing for MANETS , 2011 .
[3] Binod Kumar Pattanayak,et al. Energy aware detection and prevention of black hole attack in MANET , 2018 .
[4] Eytan Modiano,et al. Finding Minimum Energy Disjoint Paths in Wireless Ad-Hoc Networks , 2005, Wirel. Networks.
[5] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[6] Juan-Carlos Cano,et al. Power-aware routing based on the energy drain rate for mobile ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.
[7] Binod Kumar Pattanayak,et al. Energy Competent Routing Protocol Design in MANET with Real Time Application Provision , 2015, Int. J. Bus. Data Commun. Netw..
[8] Imed Bouazizi,et al. ARA-the ant-colony based routing algorithm for MANETs , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[9] Jadwiga Indulska,et al. Biologically Inspired Ant-Based Routing in Mobile Ad hoc Networks (MANET): A Survey , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[10] K. Shanthi,et al. Pair-wise key agreement and hop-by-hop authentication protocol for MANET , 2017, Wirel. Networks.
[11] Yuguang Fang,et al. A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .
[12] Qun Zhao,et al. Lifetime Maximization for Connected Target Coverage in Wireless Sensor Networks , 2008, IEEE/ACM Transactions on Networking.
[13] K. C. Reddy,et al. Identity Based Authenticated Group Key Agreement Protocol , 2002, INDOCRYPT.
[14] Frank Neumann,et al. Ant Colony Optimization and the minimum spanning tree problem , 2010, Theor. Comput. Sci..
[15] Thomas Stützle,et al. Ant Colony Optimization: A Component-Wise Overview , 2018, Handbook of Heuristics.
[16] Özgür B. Akan,et al. A survey on bio-inspired networking , 2010, Comput. Networks.
[17] Ingrid Verbauwhede,et al. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers , 2014, Selected Areas in Cryptography.
[18] V. Vijayalakshmi,et al. Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography , 2007 .
[19] Dieter Hogrefe,et al. Social Insect-based Sybil Attack Detection in Mobile Ad-hoc Networks , 2014, BICT.
[20] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[21] Chai-Keong Toh. Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001 .
[22] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[23] Mohammad Najmud Doja,et al. Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .
[24] K. Selvakumar,et al. Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks , 2012 .
[25] Chi Wan Sung,et al. On energy efficiency and network connectivity of mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[26] Weifa Liang,et al. Maximizing battery life routing in wireless ad hoc networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[27] R. Baskaran,et al. ANT Based Trustworthy Routing in Mobile Ad Hoc Networks Spotlighting Quality of Service , 2015 .
[28] Binod Kumar Pattanayak,et al. Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications , 2016 .