Author:
Desai Aneri Mukeshbhai,Jhaveri Rutvij H.
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference32 articles.
1. Li W, Joshi A (2008) Security issues in mobile ad hoc networks-a survey. Department of Computer Science and Electrical Engineering, University of Maryland, Baltimore County, pp 1–23
2. Patel PP, Jhaveri RH (2015) Various schemes to detect selfishness in wireless ad-hoc networks: a survey. 2015 International Conference on Green Computing and Internet of Things (ICGCIoT). IEEE, Noida, India, pp 881–886
3. Pathan ASK (ed) (2016) Security of self-organizing networks: MANET, WSN, WMN, VANET. CRC Press, Boca Raton
4. Kannhavong B, Nakayama H, Nemoto Y, Kato N, Jamalipour A (2007) A survey of routing attacks in mobile ad hoc networks. IEEE Wirel Commun 14(5).
https://doi.org/10.1109/MWC.2007.4396947
5. Luo J, Fan M, Ye D (2008) Black hole attack prevention based on authentication mechanism. In: Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference on IEEE, pp 173–177
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献