Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Applied Mathematics,Artificial Intelligence,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Information Systems
Reference33 articles.
1. Ahila E, Chitra K (2014) Security based energy efficient routing protocol for adhoc network. In: Proc. of IEEE international conference on control, instrumentation, communication and computational technologies (ICCICCT), pp 1522–1526. ISBN: 978-1-4799-4191-9
2. Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2016) A trust aware routing protocol for energy constrained wireless sensor network. Telecommun Syst 61:123–140. https://doi.org/10.1007/s11235-015-0068-8
3. Asadi M, Zimmerman C, Agah A (2013) A game theoretic approach to security and power conservation in wireless sensor networks. Int J Netw Secur 15:50–58
4. Banergee S (2008) Detection/removal of cooperative black and gray hole attack in mobile ad-hoc networks. In: Proc. of the world congress on engineering and computer science (WCECS 2008), San Francisco, USA, pp 337–342. ISBN: 978-988-98671-0-2 WCECS 2008
5. Biswas S, Nag T, Neogy S (2014) Trust based energy efficient detection and avoidance of black hole attack to ensure secure routing in MANET. In: Proc. of IEEE applications and innovations in mobile computing (AIMoC), pp 157–164. https://doi.org/10.1109/AIMOC.2014.6785535. ISBN: 978-1-4799-3881-0
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Link reliable on-demand distance vector routing for mobile ad hoc networks;International Journal of Information Technology;2024-06-14
2. Multipath Load Balancing in MANET via Hybrid Intelligent Algorithm;Journal of Information & Knowledge Management;2024-01-23
3. Optimizing Task Scheduling for Energy Aware Networks;2024 14th International Conference on Cloud Computing, Data Science & Engineering (Confluence);2024-01-18
4. An obstacle aware efficient MANET routing with optimized Bi-LSTM and multi-objective constraints on improved heuristic algorithm;Journal of Ambient Intelligence and Smart Environments;2023-12-05
5. Blockchain for IoT Security & Privacy: Applications, Challenges and Future Directions;Proceedings of the 5th International Conference on Information Management & Machine Intelligence;2023-11-23