- Home
- Publications
- Publication Search
- Publication Details
Title
Secure way routing protocol for mobile ad hoc network
Authors
Keywords
Secure routing, SWR, MANET, AODV, Cryptography
Journal
WIRELESS NETWORKS
Volume 23, Issue 2, Pages 345-354
Publisher
Springer Nature
Online
2015-12-22
DOI
10.1007/s11276-015-1161-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Leveraging software-defined networking for security policy enforcement
- (2016) Jiaqiang Liu et al. INFORMATION SCIENCES
- Secure and Privacy Preserving Protocol for Cloud-Based Vehicular DTNs
- (2015) Jun Zhou et al. IEEE Transactions on Information Forensics and Security
- Passive IP Traceback: Disclosing the Locations of IP Spoofers From Path Backscatter
- (2015) Guang Yao et al. IEEE Transactions on Information Forensics and Security
- Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc Networks
- (2015) Xin Ming Zhang et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks
- (2015) Jun Zhou et al. INFORMATION SCIENCES
- Information centric network: Research challenges and opportunities
- (2015) Athanasios V. Vasilakos et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A security and trust framework for virtualized networks and software-defined networking
- (2015) Zheng Yan et al. Security and Communication Networks
- Survey on channel reciprocity based key establishment techniques for wireless systems
- (2015) Tao Wang et al. WIRELESS NETWORKS
- Routing Metrics of Cognitive Radio Networks: A Survey
- (2014) Moustafa Youssef et al. IEEE Communications Surveys and Tutorials
- Toward Incentivizing Anti-Spoofing Deployment
- (2014) Bingyang Liu et al. IEEE Transactions on Information Forensics and Security
- Reliable Multicast with Pipelined Network Coding Using Opportunistic Feeding and Routing
- (2014) Peng Li et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A survey on trust management for Internet of Things
- (2014) Zheng Yan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Software-Defined and Virtualized Future Mobile and Wireless Networks: A Survey
- (2014) Mao Yang et al. MOBILE NETWORKS & APPLICATIONS
- Security of the Internet of Things: perspectives and challenges
- (2014) Qi Jing et al. WIRELESS NETWORKS
- Provably secure three-party authenticated key agreement protocol using smart cards
- (2013) Haomin Yang et al. Computer Networks
- Backpressure-based routing protocol for DTNs
- (2012) Amit Dvir et al. ACM SIGCOMM Computer Communication Review
- ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks
- (2012) Daojing He et al. IEEE TRANSACTIONS ON INFORMATION TECHNOLOGY IN BIOMEDICINE
- A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation
- (2012) R. Lacuesta et al. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS
- A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions
- (2012) Alireza Attar et al. PROCEEDINGS OF THE IEEE
- Directional routing and scheduling for green vehicular delay tolerant networks
- (2012) Yuanyuan Zeng et al. WIRELESS NETWORKS
- Joint Forensics-Scheduling Strategy for Delay-Sensitive Multimedia Applications over Heterogeneous Networks
- (2011) Liang Zhou et al. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS
- Approximating Congestion + Dilation in Networks via "Quality of Routing” Games
- (2011) Costas Busch et al. IEEE TRANSACTIONS ON COMPUTERS
- Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure
- (2011) Issa Khalil et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- Context-Aware Middleware for Multimedia Services in Heterogeneous Networks
- (2010) Liang Zhou et al. IEEE INTELLIGENT SYSTEMS
- DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature Analysis
- (2010) Zubair M Fadlullah et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs
- (2010) Yun-Sheng Yen et al. MATHEMATICAL AND COMPUTER MODELLING
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now