Wireless Ad-hoc networks: Using fuzzy trust approach to improve security between nodes
暂无分享,去创建一个
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] T. Fowler. Mesh networks for broadband access , 2001 .
[3] Sabah Jassim,et al. The effects of malicious nodes on performance of mobile ad hoc networks , 2006, SPIE Defense + Commercial Sensing.
[4] Nitin H. Vaidya,et al. Priority Scheduling in Wireless Ad Hoc Networks , 2002, MobiHoc '02.
[5] Tadeusz A. Wysocki,et al. Wireless ad-hoc networks : employing behaviour history to combat malicious nodes , 2008 .
[6] Vijay Varadharajan,et al. Trust and Recommendations in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).
[7] Ke Zhong-wu. Application of OPNET in the network project and design , 2004 .
[8] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[9] T. Aaron Gulliver,et al. AD-HOC WIRELESS NETWORK ROUTING PROTOCOLS AND IMPROVED AODV , 2003 .
[10] Upkar Varshney,et al. Mobile and wireless networks: services, evolution and issues , 2006, Int. J. Mob. Commun..
[11] Mohammed Boulmalf,et al. On the Impact of Security on the Performance of WLANs , 2007, J. Commun..
[12] N. Meghanathan. A simulation study on the stability-oriented routing protocols for mobile ad hoc networks , 2006, 2006 IFIP International Conference on Wireless and Optical Communications Networks.
[13] Samia Nefti-Meziani,et al. A fuzzy trust model for e-commerce , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).
[14] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[15] Syed Ali Jafar,et al. Too much mobility limits the capacity of wireless ad-hoc networks , 2005, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[16] C. T. Mallett,et al. Perspectives on next generation mobile , 2006 .
[17] Jie Wu,et al. Reputation and Trust-based Systems for Ad Hoc and Sensor Networks , 2006 .