Energy and Trust based Stable Routing for Heterogeneous Multihop Wireless Networks
Abstract
Full Text:
PDFReferences
G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Mis-behavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, 255-265, Aug. 2000.
X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3,
G. Indirania and K. Selvakumara, “A Swarm-Based Efficient Dis-tributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET),” Int’l J. Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103, 2014.
H. Li and M. Singhal, “Trust Management in Distributed Sys-tems,” Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007.
K. Liu, J. Deng, and K. Balakrishnan, “An Acknowledgement-Based Approach for the Detection of Routing Misbehavior in MANETs,” IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.