… In this paper we present a survey of secureadhocrouting protocols for mobile wireless networks. A mobile adhocnetwork is a collection of nodes that is connected through a wireless …
D Wang, M Hu, H Zhi - 2008 The Ninth International …, 2008 - ieeexplore.ieee.org
… Attacks on adhocnetworkrouting protocols disrupt network performance and reliability. … of attacks and securerouting. It first analyzes the reason that adhocnetwork is vulnerable to …
AM Desai, RH Jhaveri - International Journal of Information Technology, 2019 - Springer
… To improve QoS in the network, a secureroute is discovered based on a trust model which isolates selfish or malicious nodes in the route. This game based strategy depends on the …
… networks. Following that, we propose the … SecureRouting (ASR) protocol that can not only protect the privacy of nodes and routes, but also ensure the security of discovered routes. After…
… MANET routing protocols, and the contents of this work may assist MANET researchers in … securerouting protocols, particularly when employing the ACO technique to solve security …
J Liu, F Fu, J Xiao, Y Lu - … , Networking, and Parallel/Distributed …, 2007 - ieeexplore.ieee.org
… Based on EndairA, we propose a new securerouting protocol named … securerouting protocol named EndairALoc is proposed in Section 4. In Section 5 we analyze the security …
L Abusalah, A Khokhar… - … communications surveys & …, 2008 - ieeexplore.ieee.org
… on security aspects of theMANET routing protocols. The security of communication in adhoc wireless networks … revolution of the wireless adhocnetworkrouting protocols and the issues …
A Kannammal, SS Roy - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
… Securerouting being the theme of this paper, section 4 delves into the existing countermeasures for network layer attacks. Section 5 derives the motivation for the proposed research …
A Patwardhan, J Parker, A Joshi, M Iorga… - Third IEEE …, 2005 - ieeexplore.ieee.org
… of a securerouting protocol and an IDS … securerouting protocol, SecAODV. We present a detailed analysis of issues involved in the implementation and deployment of a securerouting …