International Journal of Soft Computing

Year: 2017
Volume: 12
Issue: 4
Page No. 247 - 252

A Power Efficient Trust Based Secure Routing Scheme for Mobile Ad-Hoc Networks

Authors : M.V. Rathnamma and P. Chenna Reddy

References

Blaze, M., J. Feigenbaum and J. Lacy, 1996. Decentralized trust management. Proceedings of the IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA., USA., pp: 164-173.

Capra, L., 2004. Toward a human trust model for mobile ad-hoc networks. Proceedings of the 2nd Workshop on UK-UbiNet, May 5-7, 2004, Cambridge University, Cambridge, UK., pp: 1-2.

Cho, J.H., A. Swami and I.R. Chen, 2010. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials, 13: 562-583.
CrossRef  |  Direct Link  |  

Cook, K.S., 2003. Trust in Society. Vol. 2, Sage, New York, USA.,.

Feeney, L.M. and M. Nilsson, 2001. Investigating the energy consumption of a wireless network interface in an Ad Hoc networking environment. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, April 22-26, 2001, Anchorage, AK, USA., pp: 1548-1557.

Feng, D. and Y. Zhu, 2009. An improved AODV routing protocol based on remaining power and fame. Proceedings of the International Conference on Electronic Computer Technology, February 20-22, 2009, IEEE, Macau, China, ISBN:978-0-7695-3559-3, pp: 117-121.

Nasser, N. and Y. Chen, 2007. SEEM: Secure and energy-efficient multipath routing protocol for wireless sensor networks. Comput. Communi., 30: 2401-2412.
Direct Link  |  

Neelakandan, S. and J.G. Anand, 2011. Trust based optimal routing in MANET's. Proceedings of the 2011 International Conference on Emerging Trends in Electrical and Computer Technology (ICETECT), March 23-24, 2011, IEEE, Tamil Nadu, Indian, ISBN: 978-1-4244-7923-8, pp: 1150-1156.

Park, I., J. Kim and I. Pu, 2006. Blocking expanding ring search algorithm for efficient energy consumption in mobile ad hoc networks. Proceedings of the 3rd Annual Conference on Wireless on demand Network Systems and Services (WONS 2006), January 30, 2006, IFIP, New York,USA., pp: 191-195.

Rahhal, H.A., I.A. Ali and S.I. Shaheen, 2011. A novel trust-based cross-layer model for wireless sensor networks. Proceedings of the 28th National Conference on Radio Science (NRSC), April 26-28, 2011, IEEE, Cairo, Egypt, ISBN:978-1-61284-805-1, pp: 1-10.

Rodoplu, V. and T.H. Meng, 1999. Minimum energy mobile wireless networks. Selected Areas Commun., 17: 1333-1344.
CrossRef  |  Direct Link  |  

Sun, B., C. Gui and P. Liu, 2010. Energy entropy multipath routing optimization algorithm in MANET based on GA. Proceedings of the IEEE 5th International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), September 23-26, 2010, IEEE, Changsha, China, ISBN:978-1-4244-6437-1, pp: 943-947.

Syarif, A. and R.F. Sari, 2011. Performance analysis of AODV-UI routing protocol with energy consumption improvement under mobility models in hybrid ad hoc network. Intl. J. Comput. Sci. Eng., 3: 2904-2918.

Theodorakopoulos, G. and J.S. Baras, 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Selected Areas Commun., 24: 318-328.
CrossRef  |  Direct Link  |  

Wan, P.J., G. Calinescu, X.Y. Li and O. Frieder, 2002. Minimum-energy broadcasting in static ad hoc wireless networks. Wirel. Netw., 8: 607-617.
CrossRef  |  Direct Link  |  

Zahariadis, T., P. Trakadas, H. Leligou, P. Karkazis and S. Voliotis, 2010. Implementing a trust-aware routing protocol in wireless sensor nodes. Proceedings of the Conference on Developments in E-systems Engineering (DESE), September 6-8, 2010, IEEE, London, UK., ISBN:978-1-4244-8044-9, pp: 47-52.

Zapata, M.G. and N. Asokan, 2002. Securing ad hoc routing protocols. Proceedings of the 1st ACM Workshop on Wireless Security, September 28, 2002, Atlanta, GA., USA., pp: 1-10.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved