-
1
-
-
0033154266
-
Internet-based mobile ad hoc networking
-
[1] Corson, M.S., J.P. Macker, and G.H. Cirincione, Internet-based mobile ad hoc networking. Internet Computing, IEEE, 1999. 3(4): p. 63-70.
-
(1999)
Internet Computing, IEEE
, vol.3
, Issue.4
, pp. 63-70
-
-
Corson, M.S.1
Macker, J.P.2
Cirincione, G.H.3
-
2
-
-
84922822151
-
Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors
-
[2] Nakamura, M., A. Sakurai, and J. Nakamura, Autonomic Wireless Sensor/Actuator Networks for Tracking Environment Control Behaviors. International Journal of Computer Information Systems and Industrial Management Applications, 2009. 1: p. 125-132.
-
(2009)
International Journal of Computer Information Systems and Industrial Management Applications
, vol.1
, pp. 125-132
-
-
Nakamura, M.1
Sakurai, A.2
Nakamura, J.3
-
4
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Springer
-
[4] Johnson, D.B. and D.A. Maltz, Dynamic source routing in ad hoc wireless networks, in Mobile computing. 1996, Springer. p. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
12
-
-
84857170447
-
-
Thesis Paper submitted to the Department of Computer Science, Naval Post Graduate School, Monterey, CA
-
[12] Thong, L.K., Performance Analysis of Mobile Adhoc Network Routing Protocols. 2004, Thesis Paper submitted to the Department of Computer Science, Naval Post Graduate School, Monterey, CA.
-
(2004)
Performance Analysis of Mobile Adhoc Network Routing Protocols
-
-
Thong, L.K.1
-
13
-
-
33644596361
-
Performance analysis of three routing protocols in wireless mobile ad hoc networks
-
[13] Lakshmi, M. and P. Sankaranarayanan, Performance analysis of three routing protocols in wireless mobile ad hoc networks. Information technology journal, 2006. 5(1): p. 114-120.
-
(2006)
Information Technology Journal
, vol.5
, Issue.1
, pp. 114-120
-
-
Lakshmi, M.1
Sankaranarayanan, P.2
-
16
-
-
84977898401
-
Using Directional Antennas to Prevent Wormhole Attacks
-
[16] Hu, L. and D. Evans. Using Directional Antennas to Prevent Wormhole Attacks. in NDSS. 2004.
-
(2004)
NDSS
-
-
Hu, L.1
Evans, D.2
-
18
-
-
56749164933
-
Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks
-
Springer
-
Vu, H., et al., Wormeros: A new framework for defending against wormhole attacks on wireless ad hoc networks, in Wireless Algorithms, Systems, and Applications. 2008, Springer. p. 491-502.
-
(2008)
Wireless Algorithms, Systems, and Applications
, pp. 491-502
-
-
Vu, H.1
-
19
-
-
38549151872
-
On mitigating in-band wormhole attacks in mobile ad hoc networks. In Communications
-
IEEE
-
[19] Su, X. and R.V. Boppana. On mitigating in-band wormhole attacks in mobile ad hoc networks. in Communications, 2007. ICC'07. IEEE International Conference on. 2007. IEEE.
-
(2007)
2007. ICC'07. IEEE International Conference On
-
-
Su, X.1
Boppana, R.V.2
-
20
-
-
35148886678
-
Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis
-
MILCOM 2006. IEEE. 2006. IEEE
-
[20] Gorlatova, M.A., et al. Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis. in Military Communications Conference, 2006. MILCOM 2006. IEEE. 2006. IEEE.
-
(2006)
Military Communications Conference,
-
-
Gorlatova, M.A.1
-
24
-
-
84861436103
-
Detection and prevention of wormhole attacks in MANETs using path tracing approach
-
[24] Sakthivel, T. and R. Chandrasekaran, Detection and prevention of wormhole attacks in MANETs using path tracing approach. European Journal of Scientific Research, 2012. 76(2): p. 240-252.
-
(2012)
European Journal of Scientific Research
, vol.76
, Issue.2
, pp. 240-252
-
-
Sakthivel, T.1
Chandrasekaran, R.2
-
25
-
-
84861460273
-
Usor: An unobservable secure ondemand routing protocol for mobile ad hoc networks
-
[25] Wan, Z., K. Ren, and M. Gu, Usor: An unobservable secure ondemand routing protocol for mobile ad hoc networks. Wireless Communications, IEEE Transactions on, 2012. 11(5): p. 1922-1932.
-
(2012)
Wireless Communications, IEEE Transactions On
, vol.11
, Issue.5
, pp. 1922-1932
-
-
Wan, Z.1
Ren, K.2
Gu, M.3
-
26
-
-
77956167625
-
A review current routing attacks in mobile ad-hoc networks
-
[26] Ngadi, M., R.H. Khokhar, and S. Mandala, A review current routing attacks in mobile ad-hoc networks. International Journal of Computer Science and Security, 2008. 2(3): p. 18-29.
-
(2008)
International Journal of Computer Science and Security
, vol.2
, Issue.3
, pp. 18-29
-
-
Ngadi, M.1
Khokhar, R.H.2
Mandala, S.3
-
28
-
-
42649100347
-
Detecting and avoiding wormhole attacks in wireless ad hoc networks
-
[28] Naït-Abdesselam, F., Detecting and avoiding wormhole attacks in wireless ad hoc networks. Communications Magazine, IEEE, 2008. 46(4): p. 127-133.
-
(2008)
Communications Magazine, IEEE
, vol.46
, Issue.4
, pp. 127-133
-
-
Naït-Abdesselam, F.1
-
29
-
-
48049122172
-
Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR
-
2007. IEEE. 2007. IEEE
-
[29] Baras, J.S., et al. Intrusion detection system resiliency to byzantine attacks: The case study of wormholes in OLSR. in Military Communications Conference, 2007. MILCOM 2007. IEEE. 2007. IEEE.
-
Military Communications Conference, 2007. MILCOM
-
-
Baras, J.S.1
-
30
-
-
17444426121
-
Ariadne: A secure ondemand routing protocol for ad hoc networks
-
[30] Hu, Y.-C., A. Perrig, and D.B. Johnson, Ariadne: A secure ondemand routing protocol for ad hoc networks. Wireless networks, 2005. 11(1-2): p. 21-38.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
33
-
-
37549006809
-
MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks
-
[33] Khalil, I., S. Bagchi, and N.B. Shroff, MOBIWORP: Mitigation of the wormhole attack in mobile multihop wireless networks. Ad Hoc Networks, 2008. 6(3): p. 344-362.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.3
, pp. 344-362
-
-
Khalil, I.1
Bagchi, S.2
Shroff, N.B.3
-
34
-
-
85031307530
-
Highly dynamic destinationsequenced distance-vector routing (DSDV) for mobile computers
-
ACM
-
[34] Perkins, C.E. and P. Bhagwat. Highly dynamic destinationsequenced distance-vector routing (DSDV) for mobile computers. in ACM SIGCOMM Computer Communication Review. 1994. ACM.
-
(1994)
ACM SIGCOMM Computer Communication Review
-
-
Perkins, C.E.1
Bhagwat, P.2
-
35
-
-
84860282979
-
Efficient self-organized backbone formation in mobile ad hoc networks (MANETs)
-
[35] Smys, S. and G. Josemin Bala, Efficient self-organized backbone formation in mobile ad hoc networks (MANETs). Computers & Electrical Engineering, 2012. 38(3): p. 522-532.
-
(2012)
Computers & Electrical Engineering
, vol.38
, Issue.3
, pp. 522-532
-
-
Smys, S.1
Bala, G.J.2
-
42
-
-
32844458902
-
Exploring mesh and tree-based multicast. Routing protocols for MANETs
-
[42] Viswanath, K., K. Obraczka, and G. Tsudik, Exploring mesh and tree-based multicast. Routing protocols for MANETs. Mobile Computing, IEEE Transactions on, 2006. 5(1): p. 28-42.
-
(2006)
Mobile Computing, IEEE Transactions On
, vol.5
, Issue.1
, pp. 28-42
-
-
Viswanath, K.1
Obraczka, K.2
Tsudik, G.3
-
43
-
-
85015373329
-
A flexible quality of service model for mobile adhoc networks
-
VTC 2000-Spring Tokyo. 2000 IEEE 51st. 2000. IEEE
-
Xiao, H., et al. A flexible quality of service model for mobile adhoc networks. in Vehicular Technology Conference Proceedings, 2000. VTC 2000-Spring Tokyo. 2000 IEEE 51st. 2000. IEEE.
-
(2000)
Vehicular Technology Conference Proceedings
-
-
Xiao, H.1
-
48
-
-
18944373619
-
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
-
[48] Boukerche, A., et al., An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks. computer communications, 2005. 28(10): p. 1193-1203.
-
(2005)
Computer Communications
, vol.28
, Issue.10
, pp. 1193-1203
-
-
Boukerche, A.1
-
50
-
-
78049409502
-
Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers
-
Springer
-
Irshad, A., et al., Security Enhancement for Authentication of nodes in MANET by checking the CRL status of Servers, in Security-Enriched Urban Computing and Smart Grid. 2010, Springer. p. 86-95.
-
(2010)
Security-Enriched Urban Computing and Smart Grid
, pp. 86-95
-
-
Irshad, A.1
-
54
-
-
84922787629
-
QoS issues using probabilistic non-reputation protocol in Mobile Ad Hoc Network environment
-
[54] Chi, L., QoS issues using probabilistic non-reputation protocol in Mobile Ad Hoc Network environment, in Australian Information Security Management Conference. 2006.
-
(2006)
Australian Information Security Management Conference
-
-
Chi, L.1
-
55
-
-
79551689325
-
K-directory community: Reliable service discovery in MANET
-
[55] Raychoudhury, V., et al., K-directory community: reliable service discovery in MANET. Pervasive and mobile computing, 2011. 7(1): p. 140-158.
-
(2011)
Pervasive and Mobile Computing
, vol.7
, Issue.1
, pp. 140-158
-
-
Raychoudhury, V.1
-
56
-
-
84879364254
-
Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks
-
[56] Lv, X. and H. Li, Secure group communication with both confidentiality and non-repudiation for mobile ad-hoc networks. IET Information Security, 2013. 7(2): p. 61-66.
-
(2013)
IET Information Security
, vol.7
, Issue.2
, pp. 61-66
-
-
Lv, X.1
Li, H.2
-
58
-
-
78149465598
-
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
-
[58] Su, M.-Y., Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 2011. 34(1): p. 107-117.
-
(2011)
Computer Communications
, vol.34
, Issue.1
, pp. 107-117
-
-
Su, M.-Y.1
-
60
-
-
33847326711
-
Packet drop attack: A serious threat to operational mobile ad hoc networks
-
[60] Balakrishnan, V. and V. Varadharajan, Packet drop attack: A serious threat to operational mobile ad hoc networks. Networks and Communication Systems, 2005: p. 18-25.
-
(2005)
Networks and Communication Systems
, pp. 18-25
-
-
Balakrishnan, V.1
Varadharajan, V.2
-
62
-
-
58149526685
-
Defending mechanisms against Sybil attack in next generation mobile ad hoc networks
-
[62] Pal, S., A.K. Mukhopadhyay, and P.P. Bhattacharya, Defending mechanisms against Sybil attack in next generation mobile ad hoc networks. IETE Technical Review, 2008. 25(4): p. 209.
-
(2008)
IETE Technical Review
, vol.25
, Issue.4
, pp. 209
-
-
Pal, S.1
Mukhopadhyay, A.K.2
Bhattacharya, P.P.3
-
64
-
-
33749375461
-
Energy efficiency of load balancing in MANET routing protocols
-
IEEE
-
[64] Jung, S., N. Hundewale, and A. Zelikovsky. Energy efficiency of load balancing in MANET routing protocols. in Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference on. 2005. IEEE.
-
(2005)
Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, 2005 and First ACIS International Workshop on Self-Assembling Wireless Networks. SNPD/SAWN 2005. Sixth International Conference On
-
-
Jung, S.1
Hundewale, N.2
Zelikovsky, A.3
-
66
-
-
84888121577
-
Security through virtualization on mobile ad hoc networks
-
[66] da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.
-
(2012)
International Journal on Communications Antenna and Propagation (IRECAP)
, vol.2
, Issue.4
, pp. 270-275
-
-
da Silva, E.1
E Silva, R.F.2
Albini, L.3
-
67
-
-
82055166535
-
LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks
-
Krief, F., Bennani, Y., Gomes, D., Neuman de Souza, J., LECSOM: A low-energy routing algorithm based on SOM clustering for static and mobile wireless sensor networks, (2011) International Journal on Communications Antenna and Propagation (IRECAP), 1 (1), pp. 55-63.
-
(2011)
International Journal on Communications Antenna and Propagation (IRECAP)
, vol.1
, Issue.1
, pp. 55-63
-
-
Krief, F.1
Bennani, Y.2
Gomes, D.3
de Souza, N.4
-
68
-
-
84860174143
-
Energy efficient routing protocols for wireless sensor networks: A survey
-
Shivaprakasha, K.S., Kulkarni, M., Energy efficient routing protocols for wireless sensor networks: A survey, (2011) International Review on Computers and Software (IRECOS), 6 (6), pp. 929-943.
-
(2011)
International Review on Computers and Software (IRECOS)
, vol.6
, Issue.6
, pp. 929-943
-
-
Shivaprakasha, K.S.1
Kulkarni, M.2
-
69
-
-
77952247097
-
Performance comparison of MANET routing protocols
-
[69] Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.
-
(2010)
International Review on Computers and Software (IRECOS)
, vol.5
, Issue.1
, pp. 1-5
-
-
Kumar, J.1
Kulkarni, M.2
Gupta, D.3
-
70
-
-
84873304281
-
An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing
-
[70] Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.
-
(2012)
International Review on Computers and Software (IRECOS)
, vol.7
, Issue.6
, pp. 3037-3041
-
-
Sengan, S.1
Pandian, S.C.2
-
71
-
-
84873324098
-
Group mobility judge based on node's neighbors matrix in clustering MANET
-
[71] Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.
-
(2012)
International Review on Computers and Software (IRECOS)
, vol.7
, Issue.6
, pp. 2886-2890
-
-
Jiang, H.1
Zhang, S.2
Shao, G.3
-
72
-
-
84864345864
-
TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime
-
[72] Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.
-
(2012)
International Review on Computers and Software (IRECOS)
, vol.7
, Issue.2
, pp. 499-504
-
-
Priyadarsini, S.1
Umashankar, S.2
-
73
-
-
84868149576
-
Adaptive fuzzy mobility for delay and throughput sensitive traffic in Ad Hoc networks
-
[73] Amnai, M., Fakhri, Y., Abouchabaka, J., Adaptive fuzzy mobility for delay and throughput sensitive traffic in Ad Hoc networks, (2012) International Review on Computers and Software (IRECOS), 7 (3), pp. 965-971.
-
(2012)
International Review on Computers and Software (IRECOS)
, vol.7
, Issue.3
, pp. 965-971
-
-
Amnai, M.1
Fakhri, Y.2
Abouchabaka, J.3
-
74
-
-
84873296025
-
Threshold based selfish queue scheduler in MANETs
-
[74] Lakshmi, S., Radha, S., Threshold based selfish queue scheduler in MANETs, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3245-3250.
-
(2012)
International Review on Computers and Software (IRECOS)
, vol.7
, Issue.6
, pp. 3245-3250
-
-
Lakshmi, S.1
Radha, S.2
-
75
-
-
84899676879
-
Fuzzy logic with hybrid optimization approach for optimal route selection in MANET
-
[75] Kuppuchamy, N.K., Manimegalai, R., Fuzzy logic with hybrid optimization approach for optimal route selection in MANET, (2014) International Review on Computers and Software (IRECOS), 9 (2), pp. 230-237.
-
(2014)
International Review on Computers and Software (IRECOS)
, vol.9
, Issue.2
, pp. 230-237
-
-
Kuppuchamy, N.K.1
Manimegalai, R.2
|