Author:
Addagatla Ugendhar,Janaki V.
Reference21 articles.
1. Sun YL, Han Z, Yu W, Ray Liu KJ (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: The proceeding of IEEE INFOCOM, 2006
2. Pathak V, Yao D, Iftode L (2008) Securing location aware services over VANET using geographical secure path routing. In: Proceeding of IEEE international on conference vehicular electronics and safety (ICVES), 2008
3. Yuan W (2014) An anonymous routing protocol with authenticated key establishment in wireless ad hoc networks. Int J Distrib Sens Netw
4. Zhang Y, Liu W, Lou W, Fang Y (2006) MASK: anonymous on-demand routing in mobile ad hoc networks. IEEE Trans Wirel Commun 5(9)
5. Long J, Dong M, Ota K, Liu A (2014) Achieving source location privacy and network life-time maximization through tree-based diversionary routing in wireless sensor networks. IEEE Access, 2014