Open Access
Issue |
EPJ Web Conf.
Volume 328, 2025
First International Conference on Engineering and Technology for a Sustainable Future (ICETSF-2025)
|
|
---|---|---|
Article Number | 01013 | |
Number of page(s) | 9 | |
DOI | https://doi.org/10.1051/epjconf/202532801013 | |
Published online | 18 June 2025 |
- Perkins, C.E., & Royer, E.M. (1999). Ad-hoc on-demand distance vector routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, 90–100. [Google Scholar]
- Marina, M.K., & Das, S.R. (2001). On-demand multipath distance vector routing in ad hoc networks. Proceedings of the 9th International Conference on Network Protocols, 14–23. [Google Scholar]
- Hu, Y.C., Perrig, A., & Johnson, D.B. (2002). Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Proceedings of the 22nd IEEE Conference on Computer Communications, 1976–1986. [Google Scholar]
- V.B. Kute, and M.U. Kharat. "Cooperation Aware Layer Three Multi Path Routing using QoS Approach for MANET." International Journal of Computer Applications 101.12 (2014): 41–47. [CrossRef] [Google Scholar]
- Das, S.R., Perkins, C.E., & Royer, E.M. (2000). Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE INFOCOM, 3, 3–12. [Google Scholar]
- Hu, Y.C., & Johnson, D.B. (2004). Securing on-demand source routing in ad hoc networks. Proceedings of the 2nd ACM Workshop on Wireless Security, 1–10. [Google Scholar]
- Papadimitratos, P., & Haas, Z.J. (2002). Secure routing for mobile ad hoc networks. Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, 27–31. [Google Scholar]
- Abolhasan, M., Wysocki, T., & Dutkiewicz, E. (2004). A review of routing protocols for mobile ad hoc networks. Ad Hoc Networks, 2(1), 1–22. doi:10.1016/S1570-8705(03)00043-X [CrossRef] [Google Scholar]
- Kumar, S., & Mishra, A. (2019). Security issues in MANET: A survey on attacks and defense mechanisms. Wireless Networks, 25(3), 1093–1108. doi:10.1007/s11276-017-1578-5 [Google Scholar]
- Zhou, L., & Haas, Z.J. (1999). Securing ad hoc networks. IEEE Network, 13(6), 24–30. [CrossRef] [Google Scholar]
- Alcaraz, C., & Lopez, J. (2010). Trust management for social wireless networks. IEEE Transactions on Network and Service Management, 7(4), 308–321. [Google Scholar]
- Marina, M.K., & Das, S.R. (2006). Ad hoc on-demand multipath distance vector routing. Wireless Communications and Mobile Computing, 6(7), 969–988. doi:10.1002/wcm.432 [CrossRef] [Google Scholar]
- Royer, E.M., & Toh, C.K. (1999). A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications, 6(2), 46–55. doi:10.1109/98.760423 [CrossRef] [Google Scholar]
- Saxena, P. (2020). A survey on security issues in mobile ad hoc networks (MANETs) with the aid of intrusion detection systems. Journal of Network and Computer Applications, 50(1), 91–97. doi:10.1016/j.jnca.2014.01.017 [Google Scholar]
- Yi, S., & Kravets, R. (2004). MOCA: MObile certificate authority for wireless ad hoc networks. Proceedings of the 2nd Annual PKI Research Workshop, 21–31. [Google Scholar]
- Li, F., & Wang, J. (2007). Routing in vehicular ad hoc networks: A survey. IEEE Transactions on Vehicular Technology, 56(6), 3886–3904. [Google Scholar]
- Wu, B., Chen, J., Wu, J., & Cardei, M. (2007). A survey of attacks and countermeasures in mobile ad hoc networks. Wireless Network Security, 103–135. [Google Scholar]
- Jakobsson, M., & Yung, M. (2005). Secure key distribution in ad hoc networks. IEEE Personal Communications, 10(6), 46–55. [Google Scholar]
- Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Wireless Communications, 11(1), 48–60. [CrossRef] [Google Scholar]
- Boukerche, A., & Ren, Y. (2008). A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications, 31(18), 4557–4569. [Google Scholar]
- Yi, P., Wu, Z., & Zhang, Z. (2009). Secure AODV routing protocol based on trust mechanism. Computer Science and Information Technology, 9(3), 1067–1070. [Google Scholar]
- Sen, J., & Saha, A. (2011). A distributed trust mechanism for secure routing in mobile wireless ad hoc networks. International Journal of Computer Applications, 19(4), 9–16. [Google Scholar]
- Zhang, Z., Wang, Y., & Li, H. (2012). Trust-based secure AODV routing protocol in mobile ad hoc networks. Security and Communication Networks, 7(9), 1234–1247. [Google Scholar]
- Li, H., & Singhal, M. (2007). Trust management in distributed systems. Computer, 40(4), 45–53. [CrossRef] [Google Scholar]
- Madhusudhan, V., & Rajagopalan, K. (2013). Secure routing in MANETs using hybrid cryptography. International Journal of Computer Applications, 74(6), 12–18. [Google Scholar]
- Murthy, S., & Garcia-Luna-Aceves, J.J. (1996). An efficient routing protocol for wireless networks. ACM/Baltzer Journal on Mobile Networks and Applications, 1(2), 183–197. [Google Scholar]
- Eschenauer, L., & Gligor, V.D. (2002). A key-management scheme for distributed sensor networks. Proceedings of the 9th ACM Conference on Computer and Communications Security, 41–47. [CrossRef] [Google Scholar]
- Panja, P., & Mitra, S. (2014). Trust-based secure routing in MANET. International Journal of Computer Science and Network Security, 14(7), 103–112. [Google Scholar]
- Pissinou, N., & Makki, K. (2003). Collaborative trust-based security mechanisms for mobile ad hoc networks. Proceedings of the 3rd International Conference on Network Protocols, 94–102. [Google Scholar]
- Venkataraman, V., & Kim, D. (2008). Reputation-based framework for high integrity sensor networks. IEEE Transactions on Wireless Communications, 7(9), 3576–3587. [Google Scholar]
- S. Vijayaraghvan, K. Duraiswamy, B. Kalaavathi and S. Madhavi, "A Performance Comparison of Multipath Multicast Routing Protocols for MANET", 11, November 2009, International Journal of Computer Science and Network Security, Vol. 9. [Google Scholar]
- Perkins, C.E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. Proceedings of the SIGCOMM Conference, 234–244. [CrossRef] [Google Scholar]
- H. Zafar, D. Harle, I. Andonovic, Y. Khawaja, "Performance Evaluation of Shortest Multipath Source Routing Scheme", 5, May 2009, IET Communications in Special Issue on Wireless Ad Hoc Networks, Vol. 3, pp. 700–713. [Google Scholar]
- Albrightson, R., Garcia-Luna-Aceves, J.J., & Boyce, J. (1994). A link-state routing protocol for dynamic networks. Proceedings of the SIGCOMM Conference, 238–248. [Google Scholar]
- V.C. Patil, Rajashree. V. Biradar, R.R. Mudholkar and S.R. Sawant, "On-Demand Multipath Routing Protocols for Mobile Ad Hoc Networks Issues and Comparison", International Journal of Wireless Communication and Simulation, 2010, Vol. 2, pp. 21–38 [Google Scholar]
- Ramaswamy, V., & Fu, H. (2011). Quantitative metrics for evaluating network protocols. IEEE Communications Surveys & Tutorials, 13(1), 33–49. [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.