Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Sonja Buchegger, Jean-Yves Le Boudec, “Self-Policing Mobile Ad-Hoc Networks by Reputation Systems”. IEEE Comm. Magazine, pp 101– 107, 2005.
    2. Jon Crowcroft, Richard Gibbens, Frank Kellyz, Sven Ostring, “ Modeling Incentives forCollaboration in Mobile Ad Hoc Networks”. In Proc. of WoWMoM, pp 1–6, 2010.
    3. Y. Dong, H. Go, A. Sui, V. Li, L. Hui, and S. Yiu. Providing distributed certificate authority service in mobile ad hoc networks. In Proc. Of SecureComm 2005, pp 149–156, 2005
    4. L. M. Feeney and M. Nilsson. “Investigating the energy consumption of a wireless network interface in an ad hoc networking environment”. In Proc.of INFOCOM, pp 1548–1557, 2001
    5. Saurabh Ganeriwal and Mani B. Srivastava, “Reputation-based Framework for High Integrity Sensor Networks”. ACM Transctions on Sensor Network s,4(3):1–37, 2008.
    6. Q. He, D. Wu, and P. Khosla.”A secure and objective reputation-based incentive scheme for ad hoc networks”. In Proc. of WCNC, 2004.
    7. W. Kozma Jr. and L. Lazos. “Resource-efficient accountability for node misbehavior in ad hoc networks based on random audits”. In Proc. of WiSec, 2009.
    8. Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks”. In Proc. of MobiCom, pp 255–265, 2000.
    9. P. Misheard and R. Molva. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proc. of CMS, pp 107–121, 2002
    10. Venkata N. Padmanabhan and Daniel R. Simon,“Secure Traceroute to Detect Faulty or Malicious Routing”. SIGCOMM CCR, 33(1), 2003
    11. S. A. Razak, S. M. Furnell, P. J. Brooke, “Attacks against Mobile Ad Hoc Networks Routing Protocols”
    12. Tao Shu and Marwan Krunz, “Detection of Malicious Packet Dropping in Wireless Ad Hoc Networks Based on Privacy-Preserving Public Auditing”. In Proc.of WiSec, pp 87–98, 2012
    13. Alper Tugay Mızrak, Keith Marzullo, Stefan Savage”Fault-Tolerant Forwarding in the Face of Malicious Routers”. Wireless Personal Communications, Special Issue on Security for Next Generation Communications, 29(3-4):367–388, 2004

Recent Article