30
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks

&
Pages 1063-1074 | Published online: 01 Mar 2013

References

  • M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy: 164–176
  • Z. Liu, A. W. Joy, and R. A. Thompson, A dynamic trust model for mobile ad hoc networks. IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04), (Suzhou, Chine), 15–23, 2004
  • Rangara, R.R. Jaipuria, R.S. Intelligent Secure Routing Model For MANET .2010 3rd IEEE International Conference on Computer Science and Information Technology (2010 ICCSIT):452–456
  • M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya. Quantifying trust in mobile ad-hoc networks. Proceedings of IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS’O5), (Waltham, USA), 211–223, 2005
  • Pedro B. Velloso. Analyzing aHuman-based Trust Model for Mobile Ad Hoc Networks. IEEE Symposium on Computers and Communications (ISCC’2008):102–125
  • Lacharite, Y and Dang Quan Nguyen. Atrust-based security architecture for tactical MANETS. IEEE Military Communications Conference. MILCOM 2008: 1–7, 2008
  • E. Ayday and F. Fekri. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, vol. 8, no. 2:181–192, 2010
  • Mingsheng Liu, Qingli Meng. The Ad Hoc Network Security Research Based on Trusted Computing and Semantic Remote Attestation. 2010 Second International Workshop on Education Technology and Computer Science (2010 ETCS):724–727
  • Huafei Zhu, Feng Bao. Quantifying Trust Metrics of Recommendation Systems in Ad-hoc Networks. IEEE Wireless Communications and Networking Conference, 2007 WCNC:2906–2911, 2007
  • Chen Hongsong, Ji Zhenzhou, Hu Mingzeng. Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol .Journal of Network and Computer Applications. 30(1):145–166, 2007
  • M. Al-Sharman, S.M. Yoo, B. Kim, and S. Park. Two Distributive Key Management Schemes in Mobile Ad Hoc Networks. Intelligent Automation and Soft Computing, 16(4):591–603, 2010
  • Y. L. Ren and A. Boukerche. ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks. Wireless Communications & Mobile Computing, vol. 10, no. 5: 672–687, 2010

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.