International Journal of Soft Computing

Year: 2016
Volume: 11
Issue: 7
Page No. 492 - 496

Direct and Indirect Approach Based Reputation Scheme Framework for Detecting Blackhole Attacks in Manets

Authors : V. Geetha and Hari Prasad

References

Bansal, S. and M. Baker, 2003. Observation-based cooperation enforcement in ad hoc networks. Technical Report, July 6, 2003, Stanford University, Stanford, CA., USA., pp: 1-10. http://arxiv.org/pdf/cs.ni/0307012.pdf.

Buchegger, S. and J.Y. Le Boudec, 2002. Performance analysis of the CONFIDANT protocol. Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, June 9-11, 2002, Lausanne, Switzerland, pp: 226-236.

Buchegger, S., J. Mundinger and J.Y.L. Boudec, 2008. Reputation systems for self-organized networks. IEEE. Technol. Soc. Mag., 27: 41-47.
CrossRef  |  Direct Link  |  

Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
CrossRef  |  Direct Link  |  

Mahmoud, A., A. Sameh and S. El-Kassas, 2005. Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN). Proceedings of the IEEE International Conference on Mobile Adhoc and Sensor Systems, November 7-7, 2005, IEEE, Cairo, Egypt, ISBN:0-7803-9465-8, pp: 8-8.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved