QASEC: A secured data communication scheme for mobile Ad-hoc networks
暂无分享,去创建一个
Xiangjian He | Priyadarsi Nanda | Muhammad Usman | Mian Ahmad Jan | Xiangjian He | Muhammad Usman | M. Jan | P. Nanda
[1] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[2] Martin Mauve,et al. A survey on position-based routing in mobile ad hoc networks , 2001, IEEE Netw..
[3] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[4] Yue Zhang,et al. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.
[5] Isaac Woungang,et al. Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach , 2015, IEEE Systems Journal.
[6] Mohammed Gharib,et al. Fully distributed ECC-based key management for mobile ad hoc networks , 2017, Comput. Networks.
[7] Turgay Korkmaz,et al. EMLTrust: An enhanced Machine Learning based Reputation System for MANETs , 2012, Ad Hoc Networks.
[8] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[9] Shervin Erfani,et al. Survey of multipath routing protocols for mobile ad hoc networks , 2009, J. Netw. Comput. Appl..
[10] Francesco Scarcello,et al. A New Distributed Application and Network Layer Protocol for VoIP in Mobile Ad Hoc Networks , 2014, IEEE Transactions on Mobile Computing.
[11] Asaf Shabtai,et al. Mitigating Denial of Service Attacks in OLSR Protocol Using Fictitious Nodes , 2016, IEEE Transactions on Mobile Computing.
[12] Gen-Huey Chen,et al. Bandwidth-Satisfied Multicast by Multiple Trees and Network Coding in Lossy MANETs , 2017, IEEE Systems Journal.
[13] Pau Arce,et al. Performance Evaluation of Scalable Video Streaming in Mobile Ad hoc Networks , 2016, IEEE Latin America Transactions.
[14] Ali Moussaoui,et al. A survey of routing protocols based on link-stability in mobile ad hoc networks , 2015, J. Netw. Comput. Appl..
[15] Soumyadev Maity,et al. Self-organized public key management in MANETs with enhanced security and without certificate-chains , 2014, Comput. Networks.
[16] Li Li,et al. Traffic-Load-Adaptive Medium Access Control for Fully Connected Mobile Ad Hoc Networks , 2016, IEEE Transactions on Vehicular Technology.
[17] Asaf Shabtai,et al. Contradiction Based Gray-Hole Attack Minimization for Ad-Hoc Networks , 2017, IEEE Transactions on Mobile Computing.
[18] Apollinaire Nadembega,et al. An Integrated Predictive Mobile-Oriented Bandwidth-Reservation Framework to Support Mobile Multimedia Streaming , 2014, IEEE Transactions on Wireless Communications.
[19] Rui Zhang,et al. Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks , 2015, IEEE Transactions on Wireless Communications.
[20] R. R. Manthalkar,et al. QoS Routing enhancement using metaheuristic approach in mobile ad-hoc network , 2016, Comput. Networks.
[21] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[22] Mario Kolberg,et al. Structured Peer-to-Peer overlay deployment on MANET: A survey , 2016, Comput. Networks.
[23] Gyanappa A. Walikar,et al. A survey on hybrid routing mechanisms in mobile ad hoc networks , 2017, J. Netw. Comput. Appl..