Author:
Unissa Ishrath,Ahmad Syed Jalal
Reference13 articles.
1. Karlof C, Wagner D (2003) Secure routing in wireless sensor networks: attacks and counter measures. AdHoc Netw J Spec Issue Sens Netw Appl Protoc 1(2–3):293–315
2. LNCS;JR Douceur,2002
3. Sanjeev R, Manpreet S (2011) Performance analysis of malicious node aware routing for MANET using two hop authentication. Int J Comput Appl 25(3):17–24
4. Chandrakant N (2013) Self protecting nodes for secured data transmission in energy efficient MANETs. Int J Adv Res Comput Sci Softw Eng 3(6):673–675
5. Michiardi P, Molva R (2002) CORE: a collaborative reputation mechanism to enforce node cooperation in mobile Adhoc networks. In: Proceedings of the IFIP TC6/TC11 sixth joint working conference on communications and multimedia security: advanced communications and multimedia security, Portorosz, Slovenia, pp 107–121