Collaboration of trusted node and QoS based energy multi path routing protocol for vehicular Ad Hoc networks

S Baskar, VR Sarma Dhulipala - Wireless Personal Communications, 2018 - Springer
In the recent past information transmission through the vehicular ad hoc network (VANET)
playing a vital role due to increase in accident statistics. There are numerous networking …

[PDF][PDF] Massively Parallel Solutions for Molecular Sequence Analysis.

B Schmidt, H Schröder, M Schimmler - ipdps, 2002 - hicomb.org
In this paper we present new approaches to high performance protein database scanning
on two novel massively parallel architectures to gain supercomputer power at low cost. The …

[PDF][PDF] Intrusion detection systems for the availability attacks in ad-hoc networks

N Shah, S Valiveti - International Journal of Electronics and Computer …, 2012 - Citeseer
Ad Hoc Networks are extremely vulnerable to attacks due to their dynamically changing
topology, absence of conventional security infrastructures, vulnerability of nodes and …

A new trust based secure routing scheme in MANET

M Sardar, K Majumder - Proceedings of the International Conference on …, 2014 - Springer
A mobile ad hoc network (MANET) is a self-configuring network in which several wireless
nodes temporary set up links between them. This dynamic nature of MANET makes it very …

[PDF][PDF] Identification and Elimination of Selfish Nodes in Adhoc Network

SJ Nagar, DG Raimagia, PA Ghosh - International Journal of …, 2014 - academia.edu
An Ad Hoc network is the network of self-configuring nodes without having fixed
infrastructure. Each node acts as a system and router. Many of the routing protocols of Ad …

[PDF][PDF] A comparative study on different trust based routing schemes in MANET

M Sardar, K Majumder - Int. J. Wirel. Mob. Netw.(IJWMN), 2013 - academia.edu
ABSTRACT A mobile ad hoc network is a wireless network in which no infrastructure is
available. MANET is a selfconfiguring network. Due to dynamic nature of MANET it is very …

Design and implementation of trusted routing strategy based on IPv6 flow identification

A Yin, S Zhang - … on Communications and Networking in China …, 2015 - ieeexplore.ieee.org
Research on trusted routing emerges in the wake of burgeoning trusted networks. Currently,
the research focuses on the routing strategies of lightweight network, which is mainly based …

[PDF][PDF] Different Trust Based Routing Schemes in MANET

K Divya - ijcsejournal.org
MANET is a self configuring network. Due to dynamic nature of MANET it is very challenging
work to employ a secure route. The intermediate nodes cooperate with each other as there …

IRAF: Intensified Reputed ARAN Using Fuzzy Logic.

R Sudha, D Sivakumar - IUP Journal of Computer Sciences, 2012 - search.ebscohost.com
Mobile ad hoc network--an instantaneous, easily deployable and infrastructureless network--
paves way for many applications in this ever widening communication world. The important …

[PDF][PDF] AN INVERTED LIST BASED APPROACH TO GENERATE OPTIMISED PATH IN DSR IN MANETS–A REVIEW

MDU UIET - ijcatr.com
In this paper, we design and formulate the inverted list based approach for providing safer
path and effective communication in DSR protocol. Some nodes in network can participate …