-
1
-
-
84856864329
-
Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks
-
A.N. Thakare, "Performance Analysis of AODV & DSR Routing Protocol in Mobile Ad hoc Networks," Ad Hoc Networks, pp. 211- 218, 2010.
-
(2010)
Ad Hoc Networks
, pp. 211-218
-
-
Thakare, A.N.1
-
2
-
-
46749154513
-
RFC 2501, Mobile Ad hoc Networking (MANET)
-
[Online]. Available
-
Corson, "RFC 2501, Mobile Ad hoc Networking (MANET)," IETF working group, 1999. [Online]. Available: http://www.faqs.org/rfcs/rfc2501.html
-
(1999)
IETF Working Group
-
-
Corson1
-
3
-
-
4344576243
-
Establishing Trust in Pure Ad-hoc Networks
-
A.A. Pirzada and C. Mcdonald, "Establishing Trust In Pure Ad-hoc Networks," Reproduction, vol. 26, no. c, 2004.
-
(2004)
Reproduction
, vol.26
, Issue.100
-
-
Pirzada, A.A.1
McDonald, C.2
-
4
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
[Online]. Available
-
Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000, pp. 255-265. [Online]. Available: http://portal.acm.org/citation.cfm?id=345955
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM
, pp. 255-265
-
-
Marti, T.G.1
Lai, K.2
Baker, M.3
-
5
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Springer. [Online]. Available
-
Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Protocols. Springer, 2000, pp. 172-182. [Online]. Available: http://www.springerlink.com/index/ ru2015q381304428.pdf
-
(2000)
Security Protocols
, pp. 172-182
-
-
Stajano1
Anderson, R.2
-
7
-
-
77952335922
-
Performance analysis of selfish node aware routing protocol for mobile ad hoc networks
-
[Online]. Available
-
Sundararajan and A. Shanmugam, "Performance Analysis of Selfish Node Aware Routing Protocol for Mobile Ad Hoc Networks," in The International Congress for global Science and Technology, vol. 9, no. 1, 2009, p. 1. [Online]. Available: http://www.icgst.com/cnir/Volume9/Issue1/CNIR-V9-I1.pdf#page=5
-
(2009)
The International Congress for Global Science and Technology
, vol.9
, Issue.1
, pp. 1
-
-
Sundararajan1
Shanmugam, A.2
-
8
-
-
84856874201
-
-
New York, USA: IEEE Computer Society ch. Part
-
L.A.N. Man and C. Society, IEEE Std 802.11-2007, IEEE Standard for Information Technology - Telecommunications and information exchange between systems-LANs and MANs. New York, USA: IEEE Computer Society, 2007, ch. Part 11.
-
(2007)
IEEE Std 802.11-2007, IEEE Standard for Information Technology - Telecommunications and Information Exchange between Systems-LANs and MANs
, vol.11
-
-
Man, L.A.N.1
Society, C.2
-
9
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
September 26-27, Portoroẑ, Slovenia. Kluwer Academic Pub2002
-
P. Michiardi and R. Molva, "Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks," in Advanced communications and multimedia security: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroẑ, Slovenia. Kluwer Academic Pub, 2002, p. 107.
-
(2002)
Advanced Communications and Multimedia Security: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security
, pp. 107
-
-
Michiardi, P.1
Molva, R.2
-
10
-
-
0002101577
-
Reputation systems
-
[Online]. Available
-
Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, "Reputation systems," Communications of the ACM, vol. 43, no. 12, pp. 45-48, 2000. [Online]. Available: http://portal.acm.org/citation.cfm?id=355122
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
11
-
-
0242696192
-
Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-hoc NeTworks)
-
[Online]. Available
-
Buchegger and J. Le Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)," in Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). Citeseer, 2002, pp. 226-236. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.9062
-
(2002)
Proceedings of IEEE/ ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). Citeseer
, pp. 226-236
-
-
Buchegger1
Le Boudec, J.2
-
12
-
-
77749342711
-
An efficient reputation-based mechanism to enforce cooperation in MANETs, 2009
-
Oct. [Online]. Available
-
Safaei, M. Sabaei, and F. Torgheh, "An efficient reputation-based mechanism to enforce cooperation in MANETs," 2009 International Conference on Application of Information and Communication Technologies, pp. 1-6, Oct. 2009. [Online]. Available: http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm? arnumber=5372 616
-
(2009)
International Conference on Application of Information and Communication Technologies
, pp. 1-6
-
-
Safaei1
Sabaei, M.2
Torgheh, F.3
-
14
-
-
77956975945
-
COSR: A reputation-based secure route protocol in MANET
-
[Online].Available
-
Wang, F. Wang, B. Huang, and L.T. Yang, "COSR: A Reputation- Based Secure Route Protocol in MANET," EURASIP Journal on Wireless Communications and Networking, vol. 2010, pp. 1-10, 2010. [Online].Available: http://www.hindawi.com/journals/wcn/2010/258935
-
(2010)
EURASIP Journal on Wireless Communications and Networking 2010
, pp. 1-10
-
-
Wang1
Wang, F.2
Huang, B.3
Yang, L.T.4
-
15
-
-
0029700344
-
-
[Online]. Available
-
Blaze and J. Feigenbaum, "Decentralized trust management," sp, pp. 164-173, 1996. [Online]. Available: http://www.computer.org/portal/web/csdl/ doi/10.1109/SECPRI.1996.502679
-
(1996)
Decentralized Trust Management
, pp. 164-173
-
-
Blaze1
Feigenbaum, J.2
-
17
-
-
0023139974
-
The DARPA packet radio network protocols
-
Jubin and J. Tornow, "The DARPA packet radio network protocols," Proceedings of the IEEE, vol. 75, no. 1, pp. 21-32, 1987. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber= 1457970
-
(1987)
Proceedings of the IEEE
, vol.75
, Issue.1
, pp. 21-32
-
-
Jubin1
Tornow, J.2
-
18
-
-
33750012091
-
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
-
[Online]. Available
-
Djenouri and N. Badache, "Cross-layer approach to detect data packet droppers in mobile ad-hoc networks," Self-Organizing Systems, pp. 163-176, 2006. [Online]. Available: http://www.springerlink.com/index/F91684M082376711. pdf
-
(2006)
Self-Organizing Systems
, pp. 163-176
-
-
Djenouri1
Badache, N.2
-
19
-
-
84869242199
-
Increasing security in mobile ad hoc networks by incentives to cooperate and secure routing
-
[Online]. Available
-
Khosravi and B. Tyson, "Increasing security in mobile ad hoc networks by incentives to cooperate and secure routing," Proc. Security and Management, 2006. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/ download?doi=10.1.1.90.4851
-
(2006)
Proc. Security and Management
-
-
Khosravi1
Tyson, B.2
-
20
-
-
33745646112
-
-
INRS- Universite du Quebec
-
J. Nuevo, "A comprehensible glomosim tutorial," INRS- Universite du Quebec. www.sm.luth.se/csee/courses/smd/161\-wireless/glomoman. pdf, pp. 1-34, 2004.
-
(2004)
A Comprehensible Glomosim Tutorial
, pp. 1-34
-
-
Nuevo, J.1
-
22
-
-
77954619363
-
Optimizing mobile agents migration based on decision tree learning
-
Academy of Science Engineering and Technology, PWASET
-
K. Yasser, A. Hesham, N. Elmahdi, S. Allola, and H. Ahmad, "Optimizing Mobile Agents Migration Based on Decision Tree Learning," Proceedings of the World Academy of Science Engineering and Technology, PWASET, pp. 564-570, 2007.
-
(2007)
Proceedings of the World
, pp. 564-570
-
-
Yasser, K.1
Hesham, A.2
Elmahdi, N.3
Allola, S.4
Ahmad, H.5
-
23
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
[Online]. Available
-
Royer and C. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," Personal Communications, IEEE, vol. 6, no. 2, pp. 46-55, 1999. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all. jsp?arnumber=760423
-
(1999)
Personal Communications IEEE
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer1
Toh, C.2
-
26
-
-
84968616624
-
Optimized link state routing protocol for ad hoc networks
-
[Online]. Available
-
Jacquet, P. Muhlethaler, and T. Clausen, "Optimized link state routing protocol for ad hoc networks," , 2001. IEEE INMIC, 2001. [Online]. Available: http://ieeexplore.ieee.org/xpls/abs-all.jsp?arnumber=995315
-
2001. IEEE INMIC
, vol.2001
-
-
Muhlethaler, J.P.1
Clausen, T.2
-
27
-
-
84856941187
-
Routing security in ad hoc networks
-
[Online]. doi=10.1.1.144.7589,http://citeseer.nj.
-
Lundberg, "Routing security in ad hoc networks," Helsinki University of Technology, http://citeseer. nj., pp. 1-12, 2000. [Online]. Available: http://citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.144.7589
-
(2000)
Helsinki University of Technology
, pp. 1-12
-
-
Lundberg1
-
30
-
-
0141470086
-
GPSfree positioning in mobile ad hoc networks
-
[Online]
-
Capkun, M. Hamdi, and J. Hubaux, "GPSfree positioning in mobile ad hoc networks," Cluster Computing, vol. 5, no. 2, pp. 157-167, 2002. [Online]. Available: http://www.springerlink.com/index/XP3J7RA35HYFV474.pdf
-
(2002)
Cluster Computing
, vol.5
, Issue.2
, pp. 157-167
-
-
Capkun, S.1
Hamdi, M.2
Hubaux, J.3
-
31
-
-
0030290663
-
Field studies of pedestrian walking speed and start-up time," Transportation Research Record
-
[Online]. Available
-
Knoblauch, M. Pietrucha, and M. Nitzburg, "Field studies of pedestrian walking speed and start-up time," Transportation Research Record: Journal of the Transportation Research Board, vol. 1538, no. - 1, pp. 27-38, 1996. [Online]. Available: http://trb.metapress.com/index/ K340133161573026.pdf
-
(1996)
Journal of the Transportation Research Board
, vol.1538
, Issue.1
, pp. 27-38
-
-
Pietrucha, K.M.1
Nitzburg, M.2
-
32
-
-
33845294172
-
Hidden vs. exposed terminal problem in ad hoc networks
-
Sydney, Australia. [Online]. =2plus 43minus 4
-
=2plus 43minus 4A. Jayasuriya, S. Perreau, A. Dadej, and S. Gordon, "Hidden vs. exposed terminal problem in ad hoc networks," in Proceedings of the Australian Telecommunication Networks and Applications Conference, Sydney, Australia, 2004. [Online]. Available: http://sandilands. info/sgordon/doc/jayasuriya2004- hidden.pdf
-
(2004)
Proceedings of the Australian Telecommunication Networks and Applications Conference
-
-
Jayasuriya, A.1
Perreau, S.2
Dadej, A.3
Gordon, S.4
|