 Open Access
				Open Access 
				 Subscription or Fee Access
									Subscription or Fee Access
							Energy and Trust based Stable Routing for Heterogeneous Multihop Wireless Networks
Abstract
References
G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, Jan. 2007.
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Mis-behavior in Mobile Ad Hoc Networks,” Proc. ACM MobiCom’00, 255-265, Aug. 2000.
X. Li, Z. Li, M. Stojmenovic, V. Narasimhan, and A. Nayak, “Autoregressive Trust Management in Wireless Ad Hoc Networks,” Ad Hoc & Sensor Wireless Networks, vol. 16, no. 1-3,
G. Indirania and K. Selvakumara, “A Swarm-Based Efficient Dis-tributed Intrusion Detection System for Mobile Ad Hoc Networks (MANET),” Int’l J. Parallel, Emergent and Distributed Systems, vol. 29, pp. 90-103, 2014.
H. Li and M. Singhal, “Trust Management in Distributed Sys-tems,” Computer, vol. 40, no. 2, pp. 45-53, Feb. 2007.
K. Liu, J. Deng, and K. Balakrishnan, “An Acknowledgement-Based Approach for the Detection of Routing Misbehavior in MANETs,” IEEE Trans. Mobile Computing, vol. 6, no. 5, pp. 536-550, May 2007.
S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
Refbacks
- There are currently no refbacks.
 
	This work is licensed under a Creative Commons Attribution 3.0 License.
 
 
  
  
  
  
  Email this article
			Email this article