A Trust Model for Secure and QoS Routing in MANETS
暂无分享,去创建一个
[1] S. Upadhyaya,et al. Trust Based Routing Decisions in Mobile Ad-hoc Networks , 2006 .
[2] Uyen Trang Nguyen,et al. A study of different types of attacks on multicast in mobile ad hoc networks , 2008, Ad Hoc Networks.
[3] Huafeng Wu,et al. A Trust Management Model for P2P File Sharing System , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[4] Reza Curtmola,et al. ODSBR: An On-Demand Secure Byzantine Routing Protocol , 2003 .
[5] Nei Kato,et al. A survey of routing attacks in mobile ad hoc networks , 2007, IEEE Wireless Communications.
[6] Nidal Nasser,et al. Enhanced Intrusion Detection System for Discovering Malicious Nodes in Mobile Ad Hoc Networks , 2007, 2007 IEEE International Conference on Communications.
[7] Sugata Sanyal,et al. A distributed security scheme for ad hoc networks , 2004, CROS.
[8] Moumita Deb. A Cooperative Blackhole Node Detection Mechanism for ADHOC Networks , 2008 .
[9] MengChu Zhou,et al. A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments , 2009, IEEE Transactions on Vehicular Technology.
[10] M. Tamilarasi,et al. Integrated Energy-Aware Mechanism for MANETs using On-demand Routing , 2008 .
[11] Samir Ranjan Das,et al. Energy-Aware On-Demand Routing for Mobile Ad Hoc Networks , 2002, IWDC.
[12] Sun Choi,et al. WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (sutc 2008).
[13] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[14] Rekha Patil. Cost Based Power Aware Cross Layer Routing Protocol , 2008 .
[15] M. Rajaram,et al. A Reliable and Secure Framework for Detection and Isolation of Malicious Nodes in MANET , 2008 .
[16] David K. Y. Yau,et al. Mitigating denial-of-service attacks in MANET by incentive-based packet filtering: A game-theoretic approach , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[17] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[18] N. Bhalaji,et al. Reliable Routing against Selective Packet Drop Attack in DSR based MANET , 2009, J. Softw..