Author:
Harikishore S.,Sumalatha V.
Publisher
Springer Science and Business Media LLC
Reference24 articles.
1. Abbas S, Faisal M, Rahman HU, Khan MZ, Merabti M (2018) Masquerading attacks detection in mobile ad hoc networks. IEEE Access 6:55013–55025
2. Abdolahi M, Eshghi F, Kelarestaghi M, Bag-Mohammadi M (2015) QADC-MORE: a new QoS-aware dynamic credit MORE protocol for wireless mesh networks. In: 2015 IEEE Symposium on computers and communication (ISCC) IEEE, 883–888. https://doi.org/10.1109/ISCC.2015.7405625
3. Althunibat S, Antonopoulos A, Kartsakli E, Granelli F, Verikoukis C (2016) Countering intelligent-dependent malicious nodes in target detection wireless sensor networks. IEEE Sens J 16(23):8627–8639
4. Chatterjee PS, Roy M (2018) Lightweight cloned-node detection algorithm for efficiently handling SSDF attacks and facilitating secure spectrum allocation in CWSNs. IET Wirel Sens Syst 8(3):121–128
5. Choumas K, Syrigos I, Korakis T, Tassiulas L (2017) Video-aware multicast opportunistic routing over 802.11 two-hop mesh networks. IEEE Trans Veh Technol 66(9):8372–8384. DOI:https://doi.org/10.1109/TVT.2017.2683266