A secure and energy efficient ant routing algorithm

[1]  K. Scott,et al.  Routing and channel assignment for low power transmission in PCS , 1996, Proceedings of ICUPC - 5th International Conference on Universal Personal Communications.

[2]  Binod Kumar Pattanayak,et al.  Power Aware Ad Hoc On-demand Distance Vector (PAAODV) Routing for MANETS , 2011 .

[3]  Binod Kumar Pattanayak,et al.  Energy aware detection and prevention of black hole attack in MANET , 2018 .

[4]  Eytan Modiano,et al.  Finding Minimum Energy Disjoint Paths in Wireless Ad-Hoc Networks , 2005, Wirel. Networks.

[5]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[6]  Juan-Carlos Cano,et al.  Power-aware routing based on the energy drain rate for mobile ad hoc networks , 2002, Proceedings. Eleventh International Conference on Computer Communications and Networks.

[7]  Binod Kumar Pattanayak,et al.  Energy Competent Routing Protocol Design in MANET with Real Time Application Provision , 2015, Int. J. Bus. Data Commun. Netw..

[8]  Imed Bouazizi,et al.  ARA-the ant-colony based routing algorithm for MANETs , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[9]  Jadwiga Indulska,et al.  Biologically Inspired Ant-Based Routing in Mobile Ad hoc Networks (MANET): A Survey , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[10]  K. Shanthi,et al.  Pair-wise key agreement and hop-by-hop authentication protocol for MANET , 2017, Wirel. Networks.

[11]  Yuguang Fang,et al.  A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions , 2004 .

[12]  Qun Zhao,et al.  Lifetime Maximization for Connected Target Coverage in Wireless Sensor Networks , 2008, IEEE/ACM Transactions on Networking.

[13]  K. C. Reddy,et al.  Identity Based Authenticated Group Key Agreement Protocol , 2002, INDOCRYPT.

[14]  Frank Neumann,et al.  Ant Colony Optimization and the minimum spanning tree problem , 2010, Theor. Comput. Sci..

[15]  Thomas Stützle,et al.  Ant Colony Optimization: A Component-Wise Overview , 2018, Handbook of Heuristics.

[16]  Özgür B. Akan,et al.  A survey on bio-inspired networking , 2010, Comput. Networks.

[17]  Ingrid Verbauwhede,et al.  Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers , 2014, Selected Areas in Cryptography.

[18]  V. Vijayalakshmi,et al.  Secure Antnet Routing Algorithm for Scalable Adhoc Networks Using Elliptic Curve Cryptography , 2007 .

[19]  Dieter Hogrefe,et al.  Social Insect-based Sybil Attack Detection in Mobile Ad-hoc Networks , 2014, BICT.

[20]  Vivek Kapoor,et al.  Elliptic curve cryptography , 2008, UBIQ.

[21]  Chai-Keong Toh Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001 .

[22]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[23]  Mohammad Najmud Doja,et al.  Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs , 2008 .

[24]  K. Selvakumar,et al.  Swarm based Detection and Defense Technique for Malicious Attacks in Mobile Ad Hoc Networks , 2012 .

[25]  Chi Wan Sung,et al.  On energy efficiency and network connectivity of mobile ad hoc networks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[26]  Weifa Liang,et al.  Maximizing battery life routing in wireless ad hoc networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.

[27]  R. Baskaran,et al.  ANT Based Trustworthy Routing in Mobile Ad Hoc Networks Spotlighting Quality of Service , 2015 .

[28]  Binod Kumar Pattanayak,et al.  Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications , 2016 .