Asian Journal of Information Technology

Year: 2017
Volume: 16
Issue: 2
Page No. 181 - 189

Detection of Malicious Nodes using Enhanced Integrated Dynamic Trust Recommender in MANET

Authors : Ramesh Ponnusamy, H. Abdul Raufh and S. Malarvizhi

References

Bijon, K.Z., M.M. Haque and R. Hasan, 2014. A trust based information sharing model (TRUISM) in MANET in the presence of uncertainty. Proceedings of the 12th Annual International Conference on Privacy, Security and Trust (PST) 2014, July 23-24, 2014, IEEE, San Antonio, Texas, ISBN:978-1-4799-3504-8, pp: 347-354.

Biswas, S., T. Nag and S. Neogy, 2014. Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. Proceedings of the 2014 Conference on Applications and Innovations in Mobile Computing (AIMoC), February 27-March 1, 2014, IEEE, Kolkata, India, ISBN:978-1-4799-3881-0, pp: 157-164.

Geetha, V. and K. Chandrasekaran, 2014. A distributed trust based secure communication framework for wireless sensor network. Wirel. Sens. Netw., 6: 173-183.
Direct Link  |  

Govindan, K. and P. Mohapatra, 2012. Trust computations and trust dynamics in mobile adhoc networks: A survey. Commun. Surv. Tutorials, 14: 279-298.
CrossRef  |  Direct Link  |  

Jichkar, M.R.A. and M.B. Chandak, 2014. Application of indirect trust computation in MANET. Intl. J. Adv. Res. Comput. Commun. Eng., 3: 5819-5826.

Kukreja, D., U. Singh and B.V.R. Reddy, 2013. A survey of trust based routing protocols in MANETs. J. Adv. Comput. Netw., 1: 280-285.
Direct Link  |  

Laxmi, V., C. Lal, M.S. Gaur and D. Mehta, 2015. JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET. J. Inf. Secur. Appl., 22: 99-112.
Direct Link  |  

Marchang, N. and R. Datta, 2012. Light-weight trust-based routing protocol for mobile ad hoc networks. IET. Inf. Secur., 6: 77-83.
CrossRef  |  Direct Link  |  

Patil, V.N. and S.A. Thorat, 2013. Cross layer approach to detect malicious node in MANET. Proceedings of the 4th International Conference on Computing Communications and Networking Technologies (ICCCNT) 2013, July 4-6, 2013, IEEE, India, ISBN:978-1-4799-3925-1, pp: 1-6.

Peethambaran, P. and J.S. Jayasudha, 2014. Survey of manet misbehaviour detection approaches. Intl. J. Network Secur. Appl., 6: 19-29.
Direct Link  |  

Shabut, A.M., K.P. Dahal, S.K. Bista and I.U. Awan, 2015. Recommendation based trust model with an effective defence scheme for MANETs. IEEE. Trans. Mobile Comput., 14: 2101-2115.
CrossRef  |  Direct Link  |  

Shakshuki, E.M., N. Kang and T.R. Sheltami, 2013. Eaack: A secure intrusion-detection system for Manets. IEEE. Trans. Ind. Electron., 60: 1089-1089.
CrossRef  |  Direct Link  |  

Umarani, V. and K.S. Sundaram, 2013. Survey of various trust models and their behavior in wireless sensor networks. Intl. J. Emerging Technol. Adv. Eng., 3: 180-188.
Direct Link  |  

Venkataraman, R., M. Pushpalatha and T.R. Rao, 2012. Regression-based trust model for mobile ad hoc networks. IET. Inf. Secur., 6: 131-140.
CrossRef  |  Direct Link  |  

Yang, B., R. Yamamoto and Y. Tanaka, 2014. Dempster-shafer evidence theory based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETS. Proceedings of the 16th International Conference on Advanced Communication Technology (ICACT) 2014, February 16-19, 2014, IEEE, Tokyo, Japan, ISBN:978-1-4799-3217-7, pp: 223-232.

Zhang, P., C. Lin, Y. Jiang, Y. Fan and X. Shen, 2014. A lightweight encryption scheme for network-coded mobile ad hoc networks. IEEE. Trans. Parallel Distrib. Syst., 25: 2211-2221.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved