Energy efficient secured routing protocol for MANETs
暂无分享,去创建一个
Jaswinder Singh | Sandeep Sharma | Tejpreet Singh | Tejpreet Singh | Jaswinder Singh | Sandeep Sharma
[1] Athanasios V. Vasilakos,et al. Routing Metrics of Cognitive Radio Networks: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[2] Athanasios V. Vasilakos,et al. Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey , 2014, Mobile Networks and Applications.
[3] Athanasios V. Vasilakos,et al. Survey on channel reciprocity based key establishment techniques for wireless systems , 2015, Wirel. Networks.
[4] Athanasios V. Vasilakos,et al. ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.
[5] Athanasios V. Vasilakos,et al. Toward Incentivizing Anti-Spoofing Deployment , 2014, IEEE Transactions on Information Forensics and Security.
[6] Dipayan Bose,et al. POWER AND TRUST BASED SECURED ROUTING APPROACH IN MANET , 2012 .
[7] Athanasios V. Vasilakos,et al. Provably secure three-party authenticated key agreement protocol using smart cards , 2014, Comput. Networks.
[8] Athanasios V. Vasilakos,et al. Spatial Reusability-Aware Routing in Multi-Hop Wireless Networks , 2016, IEEE Transactions on Computers.
[9] Athanasios V. Vasilakos,et al. Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.
[10] Nauman Mazhar,et al. Energy Efficient Security in MANETs: A Comparison of Cryptographic and Artificial Immune Systems , 2016 .
[11] Athanasios V. Vasilakos,et al. Delay Tolerant Networks: Protocols and Applications , 2011 .
[12] Ash Mohammad Abbas,et al. Quality of Service in mobile ad hoc networks: a survey , 2010, Int. J. Ad Hoc Ubiquitous Comput..
[13] Athanasios V. Vasilakos,et al. Leveraging software-defined networking for security policy enforcement , 2016, Inf. Sci..
[14] Tongtong Li,et al. SPM: Source Privacy for Mobile Ad Hoc Networks , 2010, EURASIP J. Wirel. Commun. Netw..
[15] Athanasios V. Vasilakos,et al. Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[16] Athanasios V. Vasilakos,et al. DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis , 2010, IEEE/ACM Transactions on Networking.
[17] Naixue Xiong,et al. Context-Aware Middleware for Multimedia Services in Heterogeneous Networks , 2010, IEEE Intelligent Systems.
[18] Athanasios V. Vasilakos,et al. Approximating Congestion + Dilation in Networks via "Quality of Routing" Games , 2012, IEEE Trans. Computers.
[19] Divya Sharma,et al. A Secure and Power Efficient Routing Scheme for Ad Hoc Networks , 2011 .
[20] Xiaoyan Hong,et al. A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.
[21] Sneha Kumari,et al. Secure DSR Protocol in MANET Using Energy Efficient Intrusion Detection System , 2012 .
[22] Sanjay Sharma,et al. SURVEY OF ENERGY EFFICIENT MULTICAST ROUTING PROTOCOLS IN MANET , 2012 .
[23] Athanasios V. Vasilakos,et al. CodePipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined network coding , 2012, 2012 Proceedings IEEE INFOCOM.
[24] Xiaolei Dong,et al. Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs , 2015, IEEE Transactions on Information Forensics and Security.
[25] Athanasios V. Vasilakos,et al. A security and trust framework for virtualized networks and software-defined networking , 2016, Secur. Commun. Networks.
[26] Athanasios V. Vasilakos,et al. Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks , 2011, IEEE Journal on Selected Areas in Communications.
[27] Yue Zhang,et al. Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks , 2015, IEEE Transactions on Mobile Computing.
[28] Athanasios V. Vasilakos,et al. SecCloud: Bridging Secure Storage and Computation in Cloud , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems Workshops.
[29] Ashwani Kush,et al. “Energy Efficient, Secure and Stable Routing Protocol for MANET” , 2012 .
[30] Athanasios V. Vasilakos,et al. Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter , 2015, IEEE Transactions on Information Forensics and Security.
[31] Vemana Chary,et al. Energy Efficient Routing Protocol for Mobile Ad hoc Networks using Trust Based Security , 2012 .
[32] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[33] Athanasios V. Vasilakos,et al. Directional routing and scheduling for green vehicular delay tolerant networks , 2012, Wireless Networks.
[34] Xiaolei Dong,et al. 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks , 2015, Inf. Sci..
[35] Athanasios V. Vasilakos,et al. Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs , 2011, Math. Comput. Model..
[36] Otto Carlos Muniz Bandeira Duarte,et al. An Efficient Group Key Management for Secure Routing in Ad Hoc Networks , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[37] Athanasios V. Vasilakos,et al. Information centric network: Research challenges and opportunities , 2015, J. Netw. Comput. Appl..
[38] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[39] Athanasios V. Vasilakos,et al. Backpressure-based routing protocol for DTNs , 2010, SIGCOMM '10.