ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-011-0413-5
◽
2011
◽
Vol 67
(4)
◽
pp. 829-857
◽
Cited By ~ 2
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Scheme
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks
Computer Communications
◽
10.1016/j.comcom.2005.06.025
◽
2006
◽
Vol 29
(8)
◽
pp. 1121-1132
◽
Cited By ~ 11
Author(s):
Jung-Shian Li
◽
Cheng-Ta Lee
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Algorithm
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks
International Journal of Electronics
◽
10.1080/00207217.2017.1285433
◽
2017
◽
Vol 104
(6)
◽
pp. 1034-1049
◽
Cited By ~ 4
Author(s):
Sunil Kumar
◽
Kamlesh Dutta
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Flooding Attack
◽
Security Scheme
◽
Direct Trust
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning
International Journal of Network Security & Its Applications
◽
10.5121/ijnsa.2016.8304
◽
2016
◽
Vol 8
(3)
◽
pp. 47-64
◽
Cited By ~ 1
Author(s):
Sivagurunathan S
◽
Prathapchandran K
◽
Thirumavalavan A
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Q Learning
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
2007 15th IEEE International Conference on Networks
◽
10.1109/icon.2007.4444053
◽
2007
◽
Cited By ~ 2
Author(s):
Hongxun Liu
◽
Jose G. Delgado-Frias
◽
Sirisha Medidi
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Cache Scheme
Download Full-text
Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks
Information and Communication Technologies - Communications in Computer and Information Science
◽
10.1007/978-3-642-15766-0_52
◽
2010
◽
pp. 344-349
◽
Cited By ~ 1
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Reputation System
◽
Local Monitoring
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Advances in Computer Science and Information Technology. Computer Science and Engineering
◽
10.1007/978-3-642-27308-7_62
◽
2012
◽
pp. 586-593
Author(s):
S. Sridhar
◽
R. Baskaran
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Routing security and authentication mechanism for mobile ad hoc networks
IEEE 60th Vehicular Technology Conference, 2004. VTC2004-Fall. 2004
◽
10.1109/vetecf.2004.1404987
◽
2005
◽
Cited By ~ 5
Author(s):
Yuh-Ren Tsai
◽
Shiuh-Jeng Wang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Authentication Mechanism
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Reputation methods for routing security for mobile ad hoc networks
SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications
◽
10.1109/tic.2003.1249106
◽
2004
◽
Cited By ~ 3
Author(s):
Po-Wah Yau
◽
C.J. Mitchell
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
Distributed Computing - IWDC 2004 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30536-1_68
◽
2004
◽
pp. 541-542
Author(s):
Punit Rathod
◽
Nirali Mody
◽
Dhaval Gada
◽
Rajat Gogri
◽
Zalak Dedhia
◽
...
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Malicious Node
◽
Security Scheme
◽
Malicious Node Detection
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Harnessing delay tolerance to increase delivery ratios in mobile ad hoc networks with misbehaving nodes
2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
◽
10.1109/mahss.2008.4660133
◽
2008
◽
Author(s):
Andre Konig
◽
Christian Gottron
◽
Matthias Hollick
◽
Ralf Steinmetz
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Delay Tolerance
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close