Secure opportunistic routing protocols: methods, models, and classification
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Secure opportunistic routing protocols: methods, models, and classification
Authors
Keywords
Wireless networks, Opportunistic routing, Security
Journal
WIRELESS NETWORKS
Volume -, Issue -, Pages -
Publisher
Springer Nature
Online
2017-09-12
DOI
10.1007/s11276-017-1575-1
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Modeling and performance evaluation of security attacks on opportunistic routing protocols for multihop wireless networks
- (2016) Mahmood Salehi et al. Ad Hoc Networks
- SGOR: Secure and scalable geographic opportunistic routing with received signal strength in WSNs
- (2015) Chen Lyu et al. COMPUTER COMMUNICATIONS
- Wormhole Attack Detection Algorithms in Wireless Network Coding Systems
- (2015) Shiyu Ji et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
- COMO: A Game-Theoretic Approach for Joint Multirate Opportunistic Routing and Forwarding in Non-Cooperative Wireless Networks
- (2015) Fan Wu et al. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS
- Opportunistic Routing in Wireless Networks: Models, Algorithms, and Classifications
- (2014) Azzedine Boukerche et al. ACM COMPUTING SURVEYS
- An Enforceable Scheme for Packet Forwarding Cooperation in Network-Coding Wireless Networks With Opportunistic Routing
- (2014) Tingting Chen et al. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
- A survey on trust management for Internet of Things
- (2014) Zheng Yan et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Management and applications of trust in Wireless Sensor Networks: A survey
- (2013) Guangjie Han et al. JOURNAL OF COMPUTER AND SYSTEM SCIENCES
- Game Theory for Wireless Sensor Networks: A Survey
- (2012) Hai-Yan Shi et al. SENSORS
- Opportunistic routing – A review and the challenges ahead
- (2011) Che-Jung Hsu et al. Computer Networks
- Routing protocols in ad hoc networks: A survey
- (2011) Azzedine Boukerche et al. Computer Networks
- Polynomial-Time Algorithms for Multirate Anypath Routing in Wireless Multihop Networks
- (2011) R. Laufer et al. IEEE-ACM TRANSACTIONS ON NETWORKING
- Trust-based minimum cost opportunistic routing for Ad hoc networks
- (2011) Wang Bo et al. JOURNAL OF SYSTEMS AND SOFTWARE
- A survey on game theory applications in wireless networks
- (2010) Dimitris E. Charilas et al. Computer Networks
- A Survey on Trust Management for Mobile Ad Hoc Networks
- (2010) Jin-Hee Cho et al. IEEE Communications Surveys and Tutorials
- A Survey of Trust and Reputation Management Systems in Wireless Communications
- (2010) Han Yu et al. PROCEEDINGS OF THE IEEE
- SOAR: Simple Opportunistic Adaptive Routing Protocol for Wireless Mesh Networks
- (2009) E. Rozner et al. IEEE TRANSACTIONS ON MOBILE COMPUTING
Publish scientific posters with Peeref
Peeref publishes scientific posters from all research disciplines. Our Diamond Open Access policy means free access to content and no publication fees for authors.
Learn MoreFind the ideal target journal for your manuscript
Explore over 38,000 international journals covering a vast array of academic fields.
Search