Trust-Based Detection of Malicious Nodes for Wireless Mesh Networks
Author:
Roy Amit KumarORCID, Khan Ajoy KumarORCID, Mahanta Hridoy JyotiORCID
Publisher
Springer Singapore
Reference20 articles.
1. Akyildiz, I.F., Wang, X.: A survey on wireless mesh networks. IEEE Commun. Mag. 9, S23–S30 (2005) 2. Piechowiak, M., Zwierzykowski, P., Owczarek, P., Wasłowicz, M.: Comparative analysis of routing protocols for wireless mesh networks. In: 10th International Symposium on IEEE Communication Systems, Networks and Digital Signal Processing (CSNDSP), pp. 1–5, Prague, Czech Republic (2016).
https://doi.org/10.1109/CSNDSP.2016.7573902 3. Moudni, H., Er-rouidi, M., Mouncif, H., El Hadadi, B.: Secure routing protocols for mobile ad hoc networks. In: International Conference on IEEE Information Technology for Organizations Development (IT4OD), Fez, Moroccopp, pp. 1–7 (2016).
https://doi.org/10.1109/IT4OD.2016.7479295 4. Zhang, W., Wang, Z., Das, S.K., Hassan, M.: Security Issues in Wireless Mesh Networks, pp. 309–330. Springer, Boston (2008).
https://doi.org/10.1007/978-0-387-68839-8_12 5. Santhanam, L., Xie, B., Agrawal, D.P.: Selfishness in mesh networks: wired multihop MANETs. IEEE Wireless Commun. 15, 16–23 (2008)
|
|