Journal of Engineering and Applied Sciences

Year: 2018
Volume: 13
Issue: 6
Page No. 1425 - 1429

Data Plane Security Solutions in a Mobile Ad Hoc Network: A Survey

Authors : Shirina Samreen and M.A. Jabbar

References

Awerbuch, B., R. Curtmola, D. Holmer, C. Nita-Rotaru and H. Rubens, 2008. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM. Trans. Inf. Syst. Secur., 10: 1-35.
CrossRef  |  Direct Link  |  

Djenouri, D. and N. Badache, 2008. Struggling against selfishness and black hole attacks in MANETs. Wireless Commun. Mobile Comput., 8: 689-704.
CrossRef  |  

Gonzalez, O.F., G. Ansa, M. Howarth and G. Pavlouk, 2008. Detection and Accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng., 2: 181-192.
Direct Link  |  

Kozma, W. and L. Lazos, 2009. REAct: Resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. Proceedings of the 2nd ACM Conference on Wireless Network Security, March 16-19, 2009, ACM, Zurich, Switzerland, ISBN:978-1-60558-460-7, pp: 103-110.

Liu, K., J. Deng, P.K. Varshney and K. Balakrishnan, 2007. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6: 536-550.
CrossRef  |  

Mahmoud, M.M. and X. Shen, 2013. A secure payment scheme with low communication and processing overhead for multihop wireless networks. Parallel Distrib. Syst. IEEE. Trans., 24: 209-224.
CrossRef  |  Direct Link  |  

Perlman, R., 2000. Interconnections: Bridges, Routers, Switches and Internetworking Protocols. 2nd Edn., Pearson Education, Upper Saddle River, New Jersey, ISBN:81-7758-969-5, Pages: 539.

Pouyan, A. and M.Y. Tabari, 2014. Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation. Intl. J. Eng. Trans. B Appl., 27: 739-746.
CrossRef  |  Direct Link  |  

Samreen, S. and G. Narasimha, 2013. A secure hybrid routing protocol to combat malicious packet dropping in a MANET. Intl. J. Comput. Appl., 65: 29-35.
Direct Link  |  

Samreen, S. and G. Narasimha, 2013. An efficient approach for the detection of node misbehaviour in a MANET based on link misbehaviour. Proceedings of the 2013 IEEE 3rd International Conference on Advance Computing (IACC’13), February 22-23, 2013, IEEE, Ghaziabad, India, ISBN:978-1-4673-4527-9, pp: 588-592.

Samreen, S. and G. Narsimha, 2013. An efficient security mechanism to detect the packet droppers in a MANET under individual and collusive adversarial models. Intl. J. Comput. Appl., 82: 39-43.
Direct Link  |  

Taghizadeh, S.R. and S. Mohammadi, 2013. Lebrp-a lightweight and energy balancing routing protocol for energy-constrained wireless ad hoc networks. Intl. J. Eng. Trans. A Basics, 27: 33-38.
Direct Link  |  

Weyland, A. and T. Braun, 2004. Cooperation and accounting strategy for multi-hop cellular networks. Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN’04), April 28, 2004, IEEE, Mill Valley, California, USA., ISBN:0-7803-8551-9, pp: 193-198.

Weyland, A., T. Staub and T. Braun, 2006. Comparison of motivation-based cooperation mechanisms for hybrid wireless networks. Comput. Commun., 29: 2661-2670.
Direct Link  |  

Yang, H., S.J.X. Meng and S. Lu, 2006. SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE J. Selected Areas Commun., 24: 261-273.
CrossRef  |  Direct Link  |  

Zhang, Y., W. Lou, W. Liu and Y. Fang, 2007. A secure incentive protocol for mobile ad hoc networks. Wirel. Netw., 13: 569-582.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved