ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
Distributed Computing - IWDC 2004 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30536-1_68
◽
2004
◽
pp. 541-542
Author(s):
Punit Rathod
◽
Nirali Mody
◽
Dhaval Gada
◽
Rajat Gogri
◽
Zalak Dedhia
◽
...
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Node
◽
Security Scheme
◽
Malicious Node Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Related Documents
Cited By
References
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
International Journal of Electronics
◽
10.1080/00207217.2017.1285433
◽
2017
◽
Vol 104
(6)
◽
pp. 1034-1049
◽
Cited By ~ 4
Author(s):
Sunil Kumar
◽
Kamlesh Dutta
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attack
◽
Security Scheme
◽
Direct Trust
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
EFFICIENT MALICIOUS NODE IDENTIFICATION METHOD FOR IMPROVING PACKET DELIVERY RATE IN MOBILE AD HOC NETWORKS WITH SECURED ROUTE
Journal of Critical Reviews
◽
10.31838/jcr.07.07.185
◽
2020
◽
Vol 7
(07)
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Delivery Rate
◽
Malicious Node
◽
Packet Delivery
◽
Identification Method
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-011-0413-5
◽
2011
◽
Vol 67
(4)
◽
pp. 829-857
◽
Cited By ~ 2
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Scheme
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Cluster Based Security Scheme for Mobile Ad Hoc Networks
IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, 2006. (WiMob'2006)
◽
10.1109/wimob.2006.1696379
◽
2006
◽
Cited By ~ 2
Author(s):
S.A. Nargunam
◽
M.P. Sebastian
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Distributed Security Scheme for Mobile Ad Hoc Networks
2006 IEEE International Conference on Information Acquisition
◽
10.1109/icia.2006.305988
◽
2006
◽
Cited By ~ 5
Author(s):
A. Nargunam
◽
M.P. Sebastian
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Scheme
◽
Distributed Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Mitigating the effect of malicious node in Mobile Ad Hoc Networks using Trust based Explicit No Technique
International Journal of Computer Networks and Communications Security
◽
10.47277/ijcncs/1(6)1
◽
2013
◽
Vol 1
(2013)
◽
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Node
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Routing and Data Security Scheme Based on Double Encryption in Mobile Ad Hoc Networks
2015 Fifth International Conference on Instrumentation and Measurement, Computer, Communication and Control (IMCCC)
◽
10.1109/imccc.2015.380
◽
2015
◽
Cited By ~ 1
Author(s):
Xuewen Wu
◽
Xiaokai Zhu
◽
Fei Kong
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Data Security
◽
Ad Hoc
◽
Security Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Malicious Node Attack Preventer (MNAP) Approach for Mobile Ad-hoc Networks (MANET's)
International Journal of Computer Applications
◽
10.5120/9267-3447
◽
2012
◽
Vol 58
(4)
◽
pp. 1-5
Author(s):
Raj MohanMumgai
◽
Sandip Vijay
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Node
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
A new security scheme for on-demand source routing in mobile ad hoc networks
Proceedings of the 2007 international conference on Wireless communications and mobile computing - IWCMC '07
◽
10.1145/1280940.1281063
◽
2007
◽
Cited By ~ 5
Author(s):
Woei-Jiunn Tsaur
◽
Haw-Tyng Pai
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Source Routing
◽
Security Scheme
◽
On Demand
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks
2009 International Conference on Information Technology and Computer Science
◽
10.1109/itcs.2009.113
◽
2009
◽
Cited By ~ 2
Author(s):
Yu Yao
◽
Li Zhe
◽
Liu Jun
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Security Scheme
◽
Mobile Ad Hoc
◽
Hoc Networks
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close