Journal of Engineering and Applied Sciences
Year:
2019
Volume:
14
Issue:
18
Page No.
6675 - 6684
References
Abdelshafy, M.A. and P.J. King, 2015. Dynamic source routing under attacks. Proceedings of the 7th International Workshop on Reliable Networks Design and Modeling (RNDM), October 5-7, 2015, IEEE, Munich, Germany, ISBN:978-1-4673-8050-8, pp: 174-180.
Abuhmida, M., K. Radhakrishnan and I. Wells, 2015. Evaluating the performance of ANTMANET protocol for MANET. Proceedings of the 2015 International Conference on Internet Technologies and Applications (ITA), September 8-11, 2015, IEEE, Wrexham, UK., ISBN:978-1-4799-8036-9, pp: 109-114.
Aghdam, M.H. and P. Kabiri, 2016. Feature selection for intrusion detection system using ant colony optimization. Intl. J. Network Secur., 18: 420-432.
Direct Link | Baran, B. and R. Sosa, 2001. AntNet routing algorithm for data networks based on mobile agents. Inteligencia artificial. Rev. Iberoam. Inteligencia Artif., 5: 1-10.
Direct Link | Chang, J.M., P.C. Tsou, I. Woungang, H.C. Chao and C.F. Lai, 2015. Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach. IEEE Syst. J., 9: 65-75.
CrossRef | Direct Link | Chatterjee, S. and S. Das, 2015. Ant colony optimization based enhanced dynamic source routing algorithm for mobile ad-hoc network. Inf. Sci., 295: 67-90.
CrossRef | Direct Link | Dhananjayan, G. and J. Subbiah, 2016. T2AR: Trust-aware ad-hoc routing protocol for MANET. Springer Plus, 5: 1-16.
CrossRef | PubMed | Direct Link | Dorri, A., S. Vaseghi and O. Gharib, 2018. DEBH: Detecting and eliminating black holes in mobile ad hoc network. Wirel. Networks, 24: 2943-2955.
CrossRef | Direct Link | Elmazi, D., E. Kulla, T. Oda, E. Spaho and S. Sakamoto
et al., 2015. A comparison study of two fuzzy-based systems for selection of actor node in wireless sensor actor networks. J. Ambient Intell. Hum. Comput., 6: 635-645.
CrossRef | Direct Link | Ghasemnezhad, S. and A. Ghaffari, 2018. Fuzzy logic based reliable and real-time routing protocol for mobile ad hoc networks. Wirel. Pers. Commun., 98: 593-611.
CrossRef | Direct Link | Harn, L. and C. Lin, 2010. Authenticated group key transfer protocol based on secret sharing. IEEE Trans. Comput., 59: 842-846.
CrossRef | He, D., C. Chen, M. Ma, S. Chan and J. Bu, 2013. A secure and efficient password‐authenticated group key exchange protocol for mobile ad hoc networks. Intl. J. Commun. Syst., 26: 495-504.
CrossRef | Direct Link | Jain, C. and A.K. Saxena, 2016. General study of mobile agent based Intrusion Detection System (IDS). J. Comput. Commun., 4: 93-98.
CrossRef | Direct Link | Kaur, I. and A.L.N. Rao, 2017. A framework to improve the network security with less mobility in MANET. Intl. J. Comput. Appl., 167: 21-24.
Direct Link | Khinchi, M.K. and B. Bhushan, 2016. Improving qos in manet by secure synchronous routing model. Intl. J. Res. Comput. Appl. Rob., 4: 7-14.
Direct Link | Manickavelu, D. and R.U. Vaidyanathan, 2014. Particle Swarm Optimization (PSO)-based node and link lifetime prediction algorithm for route recovery in MANET. EURASIP. J. Wirel. Commun. Networking, 2014: 107-117.
CrossRef | Direct Link | Patel, M. and S. Sharma, 2013. Detection of malicious attack in MANET a behavioral approach. Proceedings of the IEEE 3rd International Advance Computing Conference, February 22-23, 2013, IEEE, Ghaziabad, India, ISBN: 978-1-4673-4527-9, pp: 388-393.
Persis, D.J. and T.P. Robert, 2015. Ant based multi-objective routing optimization in mobile ad-hoc network. Indian J. Sci. Technol., 8: 875-888.
CrossRef | Direct Link | Rafsanjani, M.K. and H. Fatemidokht, 2015. FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs. AEU. Intl. J. Electron. Commun., 69: 1613-1621.
CrossRef | Direct Link | Shakshuki, E.M., N. Kang and T.R. Sheltami, 2013. EAACK-A secure intrusion-detection system for MANETs. IEEE Trans. Ind. Electron., 60: 1089-1098.
CrossRef | Direct Link | Singh, G. N. Kumar and A.K. Verma, 2014. ANTALG: An Innovative ACO based Routing Algorithm for MANETs. J. Network Comput. Appl., 45: 151-167.
CrossRef | Direct Link | Wei, Z., H. Tang, F.R. Yu, M. Wang and P. Mason, 2014. Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. Veh. Technol. IEEE. Trans., 63: 4647-4658.
CrossRef | Direct Link | Yang, F., V. Gondi, J.O. Hallstrom, K.C. Wang and G. Eidson, 2014. OpenFlow-based load balancing for wireless mesh infrastructure. Proceedings of the 2014 IEEE 11th International Conference on Consumer Communications and Networking (CCNC), January 10-13, 2014, IEEE, Las Vegas, Nevada, USA., pp: 444-449.
Zhang, M., M. Yang, Q. Wu, R. Zheng and J. Zhu, 2018. Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs. Future Gener. Comput. Syst., 81: 505-513.
CrossRef | Direct Link |