International Journal of Soft Computing
Year:
2016
Volume:
11
Issue:
7
Page No.
492 - 496
Direct and Indirect Approach Based Reputation Scheme Framework for
Detecting Blackhole Attacks in Manets
Authors :
V. Geetha
and
Hari Prasad
References
Bansal, S. and M. Baker, 2003. Observation-based cooperation enforcement in ad hoc networks. Technical Report, July 6, 2003, Stanford University, Stanford, CA., USA., pp: 1-10. http://arxiv.org/pdf/cs.ni/0307012.pdf.
Buchegger, S. and J.Y. Le Boudec, 2002. Performance analysis of the CONFIDANT protocol. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 9-11, 2002, Lausanne, Switzerland, pp: 226-236.
Buchegger, S., J. Mundinger and J.Y.L. Boudec, 2008. Reputation systems for self-organized networks. IEEE. Technol. Soc. Mag., 27: 41-47.
CrossRef | Direct Link | Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
CrossRef | Direct Link | Mahmoud, A., A. Sameh and S. El-Kassas, 2005. Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN). Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems, November 7-7, 2005, IEEE, Cairo, Egypt, ISBN:0-7803-9465-8, pp: 8-8.