International Journal of Soft Computing

Year: 2012
Volume: 7
Issue: 6
Page No. 294 - 301

Cluster Based Trust Mechanism for Mitigation of Internal Attacks in Mobile Ad Hoc Networks

Authors : R. Murugan and A. Shanmugam

References

Chatterjee, P., 2009. Trust based clustering and secure routing scheme for mobile Ad Hoc networks. Int. J. Comput. Networks Commun., 1: 84-97.

Conti, M., R. Di Pietro, L.V. Mancini and A. Mei, 2009. Mobility and cooperation to thwart node capture attacks in MANETs. J. Wireless Commun. Network., 10.1155/2009/945943

He, W., Y. Huang, R. Sathyam, K. Nahrstedt and W.C. Lee, 2009. SMOCK: A scalable method of cryptographic key management for mission-critical wireless Ad-Hoc networks. IEEE Trans. Inform. Forensics Secur., 4: 140-150.
CrossRef  |  

Huang, Y., B. Jin, J. Cao, G. Sun and Y. Feng, 2007. A selective push algorithm for cooperative cache consistency maintenance over MANETs. Proceedings of the 2007 International Conference on Embedded and Ubiquitous Computing, December 17-20, 2007, Taipei, Taiwan, pp: 650-660.

John, S.P. and P. Samuel, 2010. A distributed hierarchical key management scheme for mobile Ad Hoc networks. Proceedings of the International Conference on Information, Networking and Automation, October 18-19, 2010, Kunming, pp: 308-314.

Murugan, R. and A. Shanmugam, 2010. A combined solution for routing and medium access control layer attacks in mobile ad-hoc networks. J. Comput. Sci., 6: 1416-1423.

Orwat, M.E., T.E. Levin and C.E. Irvine, 2008. An ontological approach to secure MANET management. Proceedings of the 3rd International Conference on Availability, Reliability and Security, March 4-7, 2008, Barcelona, pp: 787-794.

Razak, S.A., S.M. Furnell and P.J. Brooke, 2004. Attacks against mobile Ad Hoc networks routing protocols. Proceedings of 5th Annual Postgraduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting, June 28-29, 2004, World Scientific and Engineering Academy and Society, USA., pp: 147-152.

Saad, M.I.M. and Z.A. Zukarnain, 2009. Performance analysis of random-based mobility models in MANET routing protocol. Eur. J. Sci. Res., 32: 444-454.
Direct Link  |  

Shanthi, N., L. Ganeshen and K. Ramar, 2009. Study of different attacks on multicast mobile adhoc network. J. Theor. Applied Inform. Technol., 9: 45-51.
Direct Link  |  

Uma, M. and G. Padmavathi, 2009. A comparative study and performance evaluation of reactive quality of service routing protocols in Mobile Adhoc networks. J. Theor. Applied Inform. Technol., 6: 223-239.
Direct Link  |  

Wu, B., J. Chen, J. Wu and M. Cardei, 2007. A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks. In: Wireless Mobile Network Security, Xiao, Y., X. Shen and D. Du (Eds.). Springer, New York, pp: 103-136.

Xiao, Y., X. Shen and D.Z. Du, 2007. Wireless Network Security. Springer, New York, ISBN: 9780387331126, Pages: 432.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved