Author:
Khan Muhammad Saleem,Khan Majid Iqbal,Malik Saif-Ur-Rehman,Khalid Osman,Azim Mukhtar,Javaid Nadeem
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference44 articles.
1. S Zhao, A Aggarwal, S Liu, H Wu, in IEEE Wireless Communications and Networking Conference (WCNC2008). A secure routing protocol in proactive security approach for mobile ad-hoc networks (IEEELas Vegas, 2008), pp. 2627–2632. doi: 10.1109/WCNC.2008.461 .
2. YC Hu, A Perrig, DB Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks. Wirel. Netw. 11:, 21–38 (2005).
3. P Papadimitratos, ZJ Haas, in IEEE Applications and the Internet Workshops. Secure link state routing for mobile ad hoc networks (IEEEOrlando, 2003), pp. 379–383.
4. MS Obaidat, I Woungang, SK Dhurandher, V Koo, A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks security and communication networks (John Wiley & Sons, Ltd, Malden MA, 2014).
5. T Zahariadis, P Trakadas, HC Leligou, S Maniatis, P Karkazis, A novel trust-aware geographical routing scheme for wireless sensor networks. Wirel. Pers. Commun. 69(2), 805–826 (2013).
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献