-
1
-
-
0002137142
-
-
Imielinski, T., Korth, H. (eds.) Mobile Computing, Kluwer
-
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad-Hoc Wireless Networks. In: Imielinski, T., Korth, H. (eds.) Mobile Computing, pp. 153–181. Kluwer (1996)
-
(1996)
Dynamic Source Routing in Ad-Hoc Wireless Networks
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
2
-
-
84902465196
-
A Survey of Trust Based Routing Protocols in MANETs
-
IEEE Press
-
Kukreja, D., Singh, U., Reddy, B.V.R.: A Survey of Trust Based Routing Protocols in MANETs. In: Fourth International Conference on Electronics Computer Technology (ICECT 2012), pp. 537–542. IEEE Press (2012)
-
(2012)
Fourth International Conference on Electronics Computer Technology (ICECT 2012)
, pp. 537-542
-
-
Kukreja, D.1
Singh, U.2
Reddy, B.V.R.3
-
3
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of Sixth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom), pp. 255–265 (2000)
-
(2000)
Proceedings of Sixth Ann. Int’l Conf. Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
ACM Press
-
Hu, Y.C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 2–23. ACM Press (2002)
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 2-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
0036804761
-
Routing Security inWireless Ad hoc Networks
-
Deng, H., Li W., Agrawal, D.P.: Routing Security inWireless Ad hoc Networks. IEEE Communications Magazine 40(10), 70–75 (2002)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
7
-
-
21644478586
-
-
IEEE
-
Pirzada, A.A., Datta, A., McDonald, C.: Trust-Based Routing for Ad-Hoc Wireless Networks, pp. 326–330. IEEE (2004)
-
(2004)
Trust-Based Routing for Ad-Hoc Wireless Networks
, pp. 326-330.
-
-
Pirzada, A.A.1
Datta, A.2
McDonald, C.3
-
8
-
-
33646848807
-
A Routing Protocol Based on Trust for MANETs
-
In: Zhuge, H., Fox, G.C. (eds.), Springer, Heidelberg
-
Wang, C., Yang, X., Gao, Y.: A Routing Protocol Based on Trust for MANETs. In: Zhuge, H., Fox, G.C. (eds.) GCC 2005. LNCS, vol. 3795, pp. 959–964. Springer, Heidelberg (2005)
-
(2005)
GCC 2005. LNCS
, vol.3795
, pp. 959-964
-
-
Wang, C.1
Yang, X.2
Gao, Y.3
-
11
-
-
33144465932
-
Information Theoretic Framework of TrustModeling and Evaluation for Ad Hoc Networks
-
Sun, Y.L., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Framework of TrustModeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications 24(2), 305–317 (2006)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.L.1
Yu, W.2
Han, Z.3
Liu, K.J.R.4
-
12
-
-
62449334599
-
A Trusted Routing Protocol for Wireless Mobile Ad hoc Networks
-
Conference, I.E.T. (ed.)
-
Chuanhe, H., Yong, C., Wenming, S., Hao, Z.: A Trusted Routing Protocol for Wireless Mobile Ad hoc Networks. In: Conference, I.E.T. (ed.) IET Conference onWireless, Mobile and Sensor Networks (CCWMSN 2007), pp. 406–409 (2007)
-
(2007)
IET Conference onWireless, Mobile and Sensor Networks (CCWMSN 2007)
, pp. 406-409
-
-
Chuanhe, H.1
Yong, C.2
Wenming, S.3
Hao, Z.4
-
13
-
-
56949106800
-
A trust-based security system for ubiquitous and pervasive computing environments
-
Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications 31(18), 4343–4351 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.18
, pp. 4343-4351
-
-
Boukerche, A.1
Ren, Y.2
-
14
-
-
43449107967
-
Identification of malicious nodes in an AODV pure ad hoc network through guard nodes
-
Raza, I., Hussain, S.A.: Identification of malicious nodes in an AODV pure ad hoc network through guard nodes. Computer Communications 31(9), 1796–1802 (2008)
-
(2008)
Computer Communications
, vol.31
, Issue.9
, pp. 1796-1802
-
-
Raza, I.1
Hussain, S.A.2
-
16
-
-
39049100803
-
Security in mobile adhoc networks using soft encryption and trust based multipath routing. Sci. Direct Comput
-
Narula, P., Dhurandher, S.K., Misra, S., Woungang, I.: Security in mobile adhoc networks using soft encryption and trust based multipath routing. Sci. Direct Comput. Commun. 31, 760–769 (2008)
-
(2008)
Commun
, vol.31
, pp. 760-769
-
-
Narula, P.1
Dhurandher, S.K.2
Misra, S.3
Woungang, I.4
-
17
-
-
70349749980
-
A protocol for data availability inMobile Ad-Hoc Networks in the presence of insider attacks
-
Ayday, E., Fekri, F.: A protocol for data availability inMobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks 8(2), 181–192 (2010)
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.2
, pp. 181-192
-
-
Ayday, E.1
Fekri, F.2
-
18
-
-
78650394299
-
Trust-based on-demand multipath routing in mobile ad hoc networks
-
Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based on-demand multipath routing in mobile ad hoc networks. IET Information Security 4(4), 212 (2010)
-
(2010)
IET Information Security
, vol.4
, Issue.4
, pp. 212
-
-
Li, X.1
Jia, Z.2
Zhang, P.3
Zhang, R.4
Wang, H.5
-
19
-
-
78549254177
-
Agent-based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks
-
Halim, I.T.A., Fahmy, H.M.A., El-Din, A.M.B., El-Shafey, M.H.: Agent-based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks. In: Wireless Communications Networking and Mobile Computing (WiCOM) (2010)
-
(2010)
Wireless Communications Networking and Mobile Computing (WiCOM)
-
-
Halim, I.T.A.1
Fahmy, H.M.A.2
El-Din, A.M.B.3
El-Shafey, M.H.4
-
20
-
-
79956101475
-
Building a trusted route in a mobile ad hoc network considering communication reliability and path length
-
Wang, J., Liu, Y., Jiao, Y.: Building a trusted route in a mobile ad hoc network considering communication reliability and path length. Journal of Network and Computer Applications 34(4), 1138–1149 (2011)
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1138-1149
-
-
Wang, J.1
Liu, Y.2
Jiao, Y.3
-
21
-
-
79957709100
-
FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems
-
Dhurandher, S.K., Obaidat, M.S., Verma, K., Gupta, P., Dhurandher, P.: FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems. IEEE Systems Journal 5(2), 176–188 (2011)
-
(2011)
IEEE Systems Journal
, vol.5
, Issue.2
, pp. 176-188
-
-
Dhurandher, S.K.1
Obaidat, M.S.2
Verma, K.3
Gupta, P.4
Dhurandher, P.5
-
23
-
-
39049138907
-
-
IEEE
-
Li, Y., Peng, S., Chu, W.: An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks, pp. 199–205. IEEE (2006)
-
(2006)
An Efficient Algorithm for Finding an Almost Connected Dominating Set of Small Size on Wireless Ad Hoc Networks
, pp. 199-205
-
-
Li, Y.1
Peng, S.2
Chu, W.3
-
24
-
-
84902436627
-
Security enhancement by detection and penalization of malicious nodes in wireless networks
-
Kukreja, D., Miglani, M., Dhurandher, S.K., Reddy, B.V.R.: Security enhancement by detection and penalization of malicious nodes in wireless networks. In: IEEE International Conference on Signal Processing and Integrated Networks, pp. 275–280 (2014)
-
(2014)
IEEE International Conference on Signal Processing and Integrated Networks
, pp. 275-280
-
-
Kukreja, D.1
Miglani, M.2
Dhurandher, S.K.3
Reddy, B.V.R.4
|