H Al-Bahadili - Handbook of Research on Threat Detection and …, 2015 - igi-global.com
Wireless ad hoc networks are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism for …
AA Romman, H Al-Bahadili - Int J Netw Secur Appl, 2016 - researchgate.net
Mobile ad-hoc networks (MANETs) are susceptible to attacks by malicious nodes that could easily bring down the whole network. Therefore, it is important to have a reliable mechanism …
M Reddy, PVS Srinivas… - International Journal of …, 2022 - search.ebscohost.com
Abstract Mobile Ad Hoc Networks, also known as MANET's are the part of many heterogeneous networks which utilizes the technologies like Internet of Things. Internet is …
MVK Reddy, PVS Srinivas… - International Journal of …, 2022 - search.proquest.com
In the field of communication, Mobile Ad-hoc networks (MANET) have become popular and widely used. However, there are many security challenges in communication through these …
H Chen, F Zhongchuan - Intelligent Automation & Soft Computing, 2011 - Taylor & Francis
With the rapid application and development of mobile ad hoc network, security and trust aze important to the network. As the vazious attack models, we need trust routing scheme to …
This paper proposes a trusted routing protocol for mobile ad hoc networks, called Dynamic Mutual Trust based Routing protocol (DMTR). DMTR ensures the security of the whole …
The focus of this study is to propose a generalised trust-model over routing protocols in mobile ad hoc networks (MANETs). It is observed that the presence of malicious nodes is a …
Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment. To use them in hostile environments, trust-based routing can be used, where instead of …
H Xia, Z Jia, X Li, L Ju, EHM Sha - Ad Hoc Networks, 2013 - Elsevier
Mobile ad hoc networks (MANETs) are spontaneously deployed over a geographically limited area without well-established infrastructure. The networks work well only if the mobile …