Weighted Clustering Trust Model for Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Peter Vilhan,et al. Cluster Glue -- Improving Service Reachability in PKI Enabled MANET , 2014, 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation.
[2] P. Jayashree,et al. Distributed Trust Node Selection for Secure Group Communication in MANET , 2014, 2014 Fourth International Conference on Advances in Computing and Communications.
[3] S. Sankaranarayanan,et al. A NEW APPROACH TO TRUST EVALUATION FOR CLUSTER BASED MANETS , 2014 .
[4] Abderrahim Benslimane,et al. Trust and Mobility-based Clustering Algorithm for Secure Mobile Ad Hoc Networks , 2006, 2006 International Conference on Systems and Networks Communications (ICSNC'06).
[5] Yoshiaki Kakuda,et al. A New Generation Children Tracking System Using Bluetooth MANET Composed of Android Mobile Terminals , 2012, 2012 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing.
[6] P. Annadurai,et al. Identifying malicious node using trust value in cluster based MANET (IMTVCM) , 2014, 2014 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT).
[7] Neha Gupta,et al. Cluster formation through improved weighted clustering algorithm (IWCA) for mobile ad-hoc networks , 2013, 2013 Tenth International Conference on Wireless and Optical Communications Networks (WOCN).
[8] Rituparna Chaki,et al. MCBHIDS: Modified layered cluster based algorithm for black hole IDS , 2013, 2013 Annual IEEE India Conference (INDICON).
[9] S. S. Tyagi. Study of MANET: Characteristics, Challenges, Application and Security Attacks , 2013 .
[10] Sajal K. Das,et al. An on-demand weighted clustering algorithm (WCA) for ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[11] Vallipuram Muthukkumarasamy,et al. Trust-Based Cluster Head Selection Algorithm for Mobile Ad Hoc Networks , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Shikha Jain. Security Threats in MANETS : A Review , 2014, ArXiv.
[13] A. K. Daniel,et al. Fuzzy logic based clusterhead selection protocol under Competence level, Goodness funciton and Mobility for mobile ad hoc network , 2014, 2014 Conference on IT in Business, Industry and Government (CSIBIG).
[14] M. McLoone,et al. Randomly Shifted Certification Authority Authentication Protocol for MANETs , 2007 .
[15] Seyyedeh Fatemeh Malek,et al. A cooperative rintrusion detection algorithm based on trusted voting for mobile ad hoc network , 2013, 2013 21st Iranian Conference on Electrical Engineering (ICEE).
[16] A. Karygiannis,et al. Detecting critical nodes for MANET intrusion detection systems , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[17] S. Neelavathy Pari,et al. Requisite trust-based Secure Routing Protocol for MANETs , 2012, 2012 International Conference on Recent Trends in Information Technology.
[18] Sanjay Kumar Dubey,et al. Analytical Study of Cluster Based Routing Protocols in MANET , 2014 .