Journal of Engineering and Applied Sciences
Year:
2018
Volume:
13
Issue:
6
Page No.
1425 - 1429
References
Awerbuch, B., R. Curtmola, D. Holmer, C. Nita-Rotaru and H. Rubens, 2008. ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM. Trans. Inf. Syst. Secur., 10: 1-35.
CrossRef | Direct Link | Djenouri, D. and N. Badache, 2008. Struggling against selfishness and black hole attacks in MANETs. Wireless Commun. Mobile Comput., 8: 689-704.
CrossRef | Gonzalez, O.F., G. Ansa, M. Howarth and G. Pavlouk, 2008. Detection and Accusation of packet forwarding misbehavior in mobile ad-hoc networks. J. Internet Eng., 2: 181-192.
Direct Link | Kozma, W. and L. Lazos, 2009. REAct: Resource-efficient accountability for nodemisbehavior in ad hoc networks based on random audits. Proceedings of the 2nd ACM Conference on Wireless Network Security, March 16-19, 2009, ACM, Zurich, Switzerland, ISBN:978-1-60558-460-7, pp: 103-110.
Liu, K., J. Deng, P.K. Varshney and K. Balakrishnan, 2007. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Trans. Mobile Comput., 6: 536-550.
CrossRef | Mahmoud, M.M. and X. Shen, 2013. A secure payment scheme with low communication and processing overhead for multihop wireless networks. Parallel Distrib. Syst. IEEE. Trans., 24: 209-224.
CrossRef | Direct Link | Perlman, R., 2000. Interconnections: Bridges, Routers, Switches and Internetworking Protocols. 2nd Edn., Pearson Education, Upper Saddle River, New Jersey, ISBN:81-7758-969-5, Pages: 539.
Pouyan, A. and M.Y. Tabari, 2014. Estimating reliability in mobile ad-hoc networks based on Monte Carlo simulation. Intl. J. Eng. Trans. B Appl., 27: 739-746.
CrossRef | Direct Link | Samreen, S. and G. Narasimha, 2013. A secure hybrid routing protocol to combat malicious packet dropping in a MANET. Intl. J. Comput. Appl., 65: 29-35.
Direct Link | Samreen, S. and G. Narasimha, 2013. An efficient approach for the detection of node misbehaviour in a MANET based on link misbehaviour. Proceedings of the 2013 IEEE 3rd International Conference on Advance Computing (IACC’13), February 22-23, 2013, IEEE, Ghaziabad, India, ISBN:978-1-4673-4527-9, pp: 588-592.
Samreen, S. and G. Narsimha, 2013. An efficient security mechanism to detect the packet droppers in a MANET under individual and collusive adversarial models. Intl. J. Comput. Appl., 82: 39-43.
Direct Link | Taghizadeh, S.R. and S. Mohammadi, 2013. Lebrp-a lightweight and energy balancing routing protocol for energy-constrained wireless ad hoc networks. Intl. J. Eng. Trans. A Basics, 27: 33-38.
Direct Link | Weyland, A. and T. Braun, 2004. Cooperation and accounting strategy for multi-hop cellular networks. Proceedings of the 13th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN’04), April 28, 2004, IEEE, Mill Valley, California, USA., ISBN:0-7803-8551-9, pp: 193-198.
Weyland, A., T. Staub and T. Braun, 2006. Comparison of motivation-based cooperation mechanisms for hybrid wireless networks. Comput. Commun., 29: 2661-2670.
Direct Link | Yang, H., S.J.X. Meng and S. Lu, 2006. SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE J. Selected Areas Commun., 24: 261-273.
CrossRef | Direct Link | Zhang, Y., W. Lou, W. Liu and Y. Fang, 2007. A secure incentive protocol for mobile ad hoc networks. Wirel. Netw., 13: 569-582.
CrossRef | Direct Link |