Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs
暂无分享,去创建一个
Deepika Kukreja | Sanjay Kumar Dhurandher | B. V. Ramana Reddy | S. K. Dhurandher | B. Reddy | Deepika Kukreja
[1] Geoffrey C. Fox,et al. Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30 - December 3, 2005, Proceedings , 2005, GCC.
[2] Sudip Misra,et al. Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing , 2008, Comput. Commun..
[3] Chris McDonald,et al. Trust Establishment In Pure Ad-hoc Networks , 2006, Wirel. Pers. Commun..
[4] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[5] Deepika Kukreja,et al. A Survey of Trust Based Routing Protocols in MANETs , 2014 .
[6] Azzedine Boukerche,et al. A trust-based security system for ubiquitous and pervasive computing environments , 2008, Comput. Commun..
[7] Mohamed H. El-Shafey,et al. Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks , 2010 .
[8] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Zhongwei Zhang. An intelligent scheme of secure routing for mobile Ad Hoc networks , 2008, 2008 2nd International Conference on Signal Processing and Communication Systems.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[11] Zhiping Jia,et al. Trust-based on-demand multipath routing in mobile ad hoc networks , 2010, IET Inf. Secur..
[12] Yanheng Liu,et al. Building a trusted route in a mobile ad hoc network considering communication reliability and path length , 2011, J. Netw. Comput. Appl..
[13] Amitava Datta,et al. Trust-based routing for ad-hoc wireless networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[14] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[15] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[16] Yuan Gao,et al. A Routing Protocol Based on Trust for MANETs , 2005, GCC.
[17] Deepika Kukreja,et al. Security enhancement by detection and penalization of malicious nodes in wireless networks , 2014, 2014 International Conference on Signal Processing and Integrated Networks (SPIN).
[18] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[19] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[20] Mohammad S. Obaidat,et al. FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems , 2011, IEEE Systems Journal.
[21] Syed Asad Hussain,et al. Identification of malicious nodes in an AODV pure ad hoc network through guard nodes , 2008, Comput. Commun..
[22] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[23] A.A. Pirzada,et al. Deploying trust gateways to reinforce dynamic source routing , 2005, INDIN '05. 2005 3rd IEEE International Conference on Industrial Informatics, 2005..
[24] Erman Ayday,et al. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks , 2010, Ad Hoc Networks.
[25] Zhou Hao,et al. A trusted routing protocol for wireless mobile ad hoc networks , 2007 .
[26] Shietung Peng,et al. An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.