603
Views
6
CrossRef citations to date
0
Altmetric
Original Articles

Energy Aware Secure Routing for Wireless Ad Hoc Networks

, &

REFERENCES

  • N. Gupta, and S. R. Das, “Energy-aware on-demand routing for mobile ad hoc networks,” in Proceedings of IWDC 2002, Calcutta, India, 2002, pp. 164–73.
  • C. Perkins, E. B. Royer, and S. Das, “Ad hoc on demand distance vector (AODV) routing,” presented at IETF RFC 3561, Jul. 2003.
  • S. Jayashree, B. Manoj, and C. S. R. Murthy, “On using battery state for ad hoc wireless networks,” in Proceedings of ACM MOBICOM 2004, Philadelphia, PA, Sep. 2004, pp. 360–73.
  • V. Kawadia, S. Narayanaswamy, R. Rozovsky, R. Sreenivas, and P. Kumar, “Protocols for media access control and power control in wireless networks,” in Proceedings of IEEE Conference on Decision and Control 2001, Orlando, FL, Vol. 2, Dec. 2001, pp. 1935–40.
  • M. Sanchez, P. Manzoni, and Z. Haas, “Determination of critical transmission range in ad hoc networks,” presented at the Proceedings of MMT 1999, Springer, US, 1999, pp. 293–304.
  • C. Toh, “Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks,” IEEE Commun. Mag., Vol. 39, No. 6, 2001, pp. 138–47.
  • S. Singh, and C. Raghavendra, “Power-aware multi-access protocol with signaling for ad hoc networks,” ACM Comput. Commun. Rev., Vol. 28, No. 3, 1998, pp. 5–26.
  • R. Zheng, and R. Kravets, “On-demand power management for ad hoc networks,” in Proceedings of IEEE INFOCOM 2003, San Francisco, CA,Vol. 1, Apr. 2003, pp. 481–91.
  • P. Rong, and M. Pedram, “Battery-aware power management based on Markovian decision processes,” in Proceedings of ICCAD 2002, San Jose, CA, 2002, pp. 707–13.
  • V. Kanodia, C. Li, A. Sabharwal, B. Sadeghi, and E. Knightly, “Ordered packet scheduling in wireless ad hoc networks: Mechanisms and performance analysis,” presented at the Proceedings of ACM MOBIHOC, Lausanne, Switzerland, 2002, pp. 58–70.
  • C. Chiasserini, and R. Rao, “A traffic control scheme to optimize the battery pulsed discharge,” in Proceedings of IEEE MILCOM, Atlantic City, NJ, 1999, pp. 1419–23.
  • C. Chiasserini, and R. Rao, “Energy efficient battery management,” in Proceedings of IEEE INFOCOM 2000, Tel Aviv, Vol. 2, 2000, pp. 396–403.
  • S. Jayashree, B. Manoj, and C. S. R. Murthy, “Network lifetime driven MAC protocols for ad hoc wireless networks,” Springer Wireless Networks, Volume 14, no. 6, 2008, pp. 929–47.
  • W. J. Adams, and N. J. Davis, “Toward a decentralized trust-based access control system for dynamic collaboration,” in Proceedings of 6th Annual IEEE SMC Information Assurance Workshop IAW’05, West Point, NY, Jun. 2005, pp. 317–24.
  • Boukerche, and Y. Ren, “A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks,” in Proceedings of Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, Vancouver, Canada, 2008, pp. 88–95.
  • L. Ruidong, L. Jie, L. Peng, and H.-H. Chen, “An objective trust management framework for mobile ad hoc networks,” in Proceedings of IEEE 65th Vehicular Technology Conference, Dublin, Apr. 2007, pp. 56–60.
  • G. Theodorakopoulos, and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of Workshop on Wireless Security, Philadelphia, PA, 2004, pp. 1–10.
  • T. Jiang, and J. S. Baras, “Ant-based adaptive trust evidence distribution in MANET,” in Proceedings of 2nd International Conference on Mobile Distributed Computing Systems Workshops and MDC, Tokyo, Mar. 2004, pp. 588–93.
  • P. Chatterjee, U. Ghosh, I. Sengupta, and S. K. Ghosh, “Approach for modelling trust in cluster-based wireless ad hoc networks,” IET Networks, Dec. 2013.
  • Z. Yan, P. Zhang, and T. Virtanen, “Trust evaluation based security solution in ad hoc networks,” presented at the Proceedings of Seventh Nordic Workshop on Secure IT Systems, Gjovik, Norway, 2003.
  • A. A. Pirzada, and C. McDonald, “Establishing trust in pure ad-hoc networks,” presented at the Proceedings of 27th Conference on Australasian Computer Science CRPIT’04 and Australian Computer Society and Inc, Dunedin, New Zealand, 2004, pp. 47–54.
  • T. Ghosh, N. Pissinou, and K. Makki, “Collaborative trust-based routing in multi-hop ad hoc networks,” in Proceedings of 3rd International IFIP-TC06 Networking Conference, Lecture Notes in Computer Science, Tampa, FL, May 9–14, 2004, pp. 1446–51.
  • T. Ghosh, N. Pissinou, and K. Makki, “Towards designing a trust routing solution in mobile ad hoc networks,” Mobile Networks Appl., Vol. 10, pp. 985–95, 2005.
  • V. Balakrishnnan, V. Varadharajan, U. K. Tupakula, and P. Lucs, “Trust and recommendations in mobile ad hoc networks,” in Proceedings of 10th IEEE International Conference on Networking and Services, Athens, 2007, pp. 64–9.
  • M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya, “Quantifying trust in mobile ad-hoc networks,” in Proceedings of IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems KIMAS’05, Waltham, MA, 2005, pp. 65–71.
  • B.-J. Chang, and S.-L. Kuo, “Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs,” IEEE Trans. Vehicular Technol., Vol. 58, pp. 1846–63, May 2009.
  • P. Chatterjee, I. Sengupta, and S. Ghosh, “STACRP: A secure trusted auction oriented clustering based routing protocol for MANET,” Cluster Comput., Vol. 15, pp. 303–20, 2012.
  • A. P. Dempster, “A generalization of Bayesian interface,” J. R. Stat. Soc., Vol. 30, pp. 205–447, 1968.
  • G. Shafer, A Mathematical Theory of Evidence. Princeton University Press, 1976.
  • P. Rong, and M. Pedram, “An analytical model for predicting the remaining battery capacity of lithium-ion batteries,” IEEE Trans. VLSI Systems, Vol. 14, pp. 441–51, May 2006.
  • K. Fall, and K. Varadhan. The ns manual. Available: isi.edu/nsnam/ns/doc.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.