Trust Enhanced Dynamic Source Routing Protocol for Adhoc Networks
暂无分享,去创建一个
N. Bhalaji | A. Shanmugam | V. Sundar | A. R. Sivaramkrishnan | Sinchan banerjee | V. Sundar | N. Bhalaji | A. Shanmugam | Sinchan Banerjee
[1] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[2] R. Lewontin. ‘The Selfish Gene’ , 1977, Nature.
[3] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[4] Zygmunt J. Haas,et al. Securing the Internet routing infrastructure , 2002, IEEE Commun. Mag..
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[7] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[8] Ernesto Jiménez Caballero. Vulnerabilities of Intrusion Detection Systems in Mobile Ad-hoc Networks-The routing problem , 2006 .
[9] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[10] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[11] John Keane. Trust Based Dynamic Source Routing in Mobile Ad-Hoc Networks , 2002 .
[12] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[13] S Neelavathy Pari,et al. Mitigating routing misbehaviour in self organizing mobile ad hoc network using K-neighbourhood local reputation system , 2011, 2011 International Conference on Recent Trends in Information Technology (ICRTIT).