ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Modeling and Analysis of Connectivity in Mobile Ad Hoc Networks with Misbehaving Nodes
Mapping Intimacies
◽
10.1109/icc.2006.254994
◽
2006
◽
Cited By ~ 33
Author(s):
Fei Xing
◽
Wenye Wang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Modeling And Analysis
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Related Documents
Cited By
References
Authentication Using Trust to Detect Misbehaving Nodes in Mobile Ad hoc Networks Using Q-Learning
International Journal of Network Security & Its Applications
◽
10.5121/ijnsa.2016.8304
◽
2016
◽
Vol 8
(3)
◽
pp. 47-64
◽
Cited By ~ 1
Author(s):
Sivagurunathan S
◽
Prathapchandran K
◽
Thirumavalavan A
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Q Learning
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Using a Cache Scheme to Detect Misbehaving Nodes in Mobile Ad-Hoc Networks
2007 15th IEEE International Conference on Networks
◽
10.1109/icon.2007.4444053
◽
2007
◽
Cited By ~ 2
Author(s):
Hongxun Liu
◽
Jose G. Delgado-Frias
◽
Sirisha Medidi
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Cache Scheme
Download Full-text
Modeling and Analysis of a Stable Direction-Based Routing Protocol in Vehicle Mobile Ad Hoc Networks
2009 5th International Conference on Wireless Communications, Networking and Mobile Computing
◽
10.1109/wicom.2009.5303348
◽
2009
◽
Author(s):
Yang Yang
◽
Lei Wang
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Modeling And Analysis
◽
Stable Direction
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Local Monitoring based Reputation System with Alert to Mitigate the Misbehaving Nodes in Mobile Ad Hoc Networks
Information and Communication Technologies - Communications in Computer and Information Science
◽
10.1007/978-3-642-15766-0_52
◽
2010
◽
pp. 344-349
◽
Cited By ~ 1
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Reputation System
◽
Local Monitoring
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering - Advances in Computer Science and Information Technology. Computer Science and Engineering
◽
10.1007/978-3-642-27308-7_62
◽
2012
◽
pp. 586-593
Author(s):
S. Sridhar
◽
R. Baskaran
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks
Journal of Network and Computer Applications
◽
10.1016/j.jnca.2011.03.016
◽
2012
◽
Vol 35
(3)
◽
pp. 1001-1012
◽
Cited By ~ 79
Author(s):
Jin-Hee Cho
◽
Ananthram Swami
◽
Ing-Ray Chen
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Trust Management
◽
Ad Hoc
◽
Modeling And Analysis
◽
Trust Chain
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Harnessing delay tolerance to increase delivery ratios in mobile ad hoc networks with misbehaving nodes
2008 5th IEEE International Conference on Mobile Ad Hoc and Sensor Systems
◽
10.1109/mahss.2008.4660133
◽
2008
◽
Author(s):
Andre Konig
◽
Christian Gottron
◽
Matthias Hollick
◽
Ralf Steinmetz
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Delay Tolerance
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Penalization of Selfish and Misbehaving Nodes at MAC Layer in Mobile Ad Hoc Networks
i-manager’s Journal on Software Engineering
◽
10.26634/jse.2.3.518
◽
2008
◽
Vol 2
(3)
◽
pp. 22-30
Author(s):
Gunasekarn R
◽
Rhymend Utthariaraj V
◽
Sudharsan R
◽
Sujitha Priyadharsini S
◽
Yamini U
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Mac Layer
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Collaborative Polling based Routing Security Scheme to Mitigate the Colluding Misbehaving Nodes in Mobile Ad Hoc Networks
Wireless Personal Communications
◽
10.1007/s11277-011-0413-5
◽
2011
◽
Vol 67
(4)
◽
pp. 829-857
◽
Cited By ~ 2
Author(s):
K. Gopalakrishnan
◽
V. Rhymend Uthariaraj
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Ad Hoc
◽
Routing Security
◽
Security Scheme
◽
Misbehaving Nodes
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks
Wireless Networks
◽
10.1007/s11276-009-0194-x
◽
2009
◽
Vol 16
(4)
◽
pp. 1157-1173
◽
Cited By ~ 4
Author(s):
Jin-Hee Cho
◽
Ing-Ray Chen
Keyword(s):
Intrusion Detection
◽
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Communication Systems
◽
Ad Hoc
◽
Group Communication
◽
Modeling And Analysis
◽
Mobile Ad Hoc
◽
Hoc Networks
◽
Group Communication Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close