A Novel Markov Model-Based Low-Power and Secure Multihop Routing Mechanism
暂无分享,去创建一个
Danyang Qin | Songxiang Yang | Lin Ma | Shuang Jia | Lin Ma | Danyang Qin | Shuang Jia | Songxiang Yang
[1] Quanyan Zhu,et al. Game theory meets network security and privacy , 2013, CSUR.
[2] Madjid Merabti,et al. On the evaluation of reputation and trust-based schemes in mobile ad hoc networks , 2015, Secur. Commun. Networks.
[3] Noor Muhammad Khan,et al. Low Complexity Signed Response Based Sybil Attack Detection Mechanism in Wireless Sensor Networks , 2016, J. Sensors.
[4] Wang Bo,et al. Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011 .
[5] Hsiao-Hwa Chen,et al. Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[6] Wenjia Li,et al. ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.
[7] Kamanashis Biswas,et al. Security Threats in Mobile Ad Hoc Network , 2007 .
[8] Zubair Khalid,et al. GRAdient Cost Establishment (GRACE) for an Energy-Aware Routing in Wireless Sensor Networks , 2009, EURASIP J. Wirel. Commun. Netw..
[9] Bo Wang,et al. Trust-based minimum cost opportunistic routing for Ad hoc networks , 2011, J. Syst. Softw..
[10] Hsien-Chou Liao,et al. A New Data Encryption Algorithm Based on the Location of Mobile Users , 2008 .
[11] J. M. Gnanasekar,et al. Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Int. J. Wirel. Mob. Comput..
[12] Xiangyun Zhou,et al. Secure Routing in Multihop Wireless Ad-Hoc Networks With Decode-and-Forward Relaying , 2016, IEEE Transactions on Communications.
[13] Sungyoung Lee,et al. Energy-Efficient Secure Path Algorithm for Wireless Sensor Networks , 2012, Int. J. Distributed Sens. Networks.
[14] Lynda Mokdad,et al. Recursive‐clustering‐based approach for denial of service (DoS) attacks in wireless sensors networks , 2015, Int. J. Commun. Syst..
[15] J. M. Gnanasekar,et al. Path Observation Based Physical Routing Protocol for Wireless Ad Hoc Networks , 2017, Wirel. Pers. Commun..
[16] Vijay Laxmi,et al. Bandwidth-aware routing and admission control for efficient video streaming over MANETs , 2015, Wirel. Networks.
[17] Sandeep A. Thorat,et al. Opportunistic Routing in Presence of Selfish Nodes for MANET , 2015, Wirel. Pers. Commun..
[18] Ghufran Ahmed,et al. Real-time gradient Cost Establishment (RT-GRACE) for an energy-aware routing in Wireless Sensor Networks , 2013, 2013 IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
[19] N. Jeyanthi,et al. A Trust and Fuzzy Cluster Based Dynamic Secure Routing Algorithm for Mobile Ad Hoc Networks , 2018, Wirel. Pers. Commun..
[20] Jan Janecek,et al. Distributed phase-shift beamforming power balancing in ad-hoc and sensor networks , 2014, Telecommun. Syst..
[21] Xuejun Sha,et al. On Physical Layer Security: Weighted Fractional Fourier Transform Based User Cooperation , 2017, IEEE Transactions on Wireless Communications.
[22] Ghufran Ahmed,et al. Adaptive Power-Control Based Energy-Efficient Routing in Wireless Sensor Networks , 2017, Wirel. Pers. Commun..
[23] Azzedine Boukerche,et al. A Scalable Bandwidth-Efficient Hybrid Adaptive Service Discovery Protocol for Vehicular Networks with Infrastructure Support , 2014, IEEE Transactions on Mobile Computing.
[24] Guangjie Han,et al. A Survivability Clustering Algorithm for Ad Hoc Network Based on a Small-World Model , 2015, Wirel. Pers. Commun..
[25] Gergely Ács,et al. Secure Routing in Multi-hop Wireless , 2009 .
[26] Akanksha Mathur. A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms , 2012 .
[27] Fakhri Karray,et al. Recent Advances on Context-Awareness and Data/Information Fusion in ITS , 2014, International Journal of Intelligent Transportation Systems Research.
[28] Sheng Su,et al. Secure and efficient data collection in wireless image sensor network based on ellipse batch dispersive routing , 2015, Secur. Commun. Networks.
[29] Xiao Wang,et al. A Credible Routing Based on a Novel Trust Mechanism in Ad Hoc Networks , 2013, Int. J. Distributed Sens. Networks.
[30] Sanjay Silakari,et al. Trust Formulization in Dynamic Source Routing Protocol Using SVM , 2014 .
[31] Xianzhong Zhou,et al. A cross-layer protocol for exploiting cooperative diversity in multi-hop wireless ad hoc networks , 2017, Wirel. Networks.