An approach for detection of malicious node using fuzzy based trust levels in MANET
Abstract
References
Recommendations
Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks
Quality of service QoS provisioning in mobile ad hoc networks MANETs is one of the fundamental concerns in this area. Autonomous mobility of nodes is one of the main factors affecting the network QoS. A lack of fixed infrastructure and central control ...
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World WirelesslyTraditional routing protocols deployed to provide communication among mobile nodes in wireless ad hoc networks (MANET) assume a trust and collaborating environment inside the network. However, this assumption is not always true and a hostile or ...
An Efficient Approach for Wormhole detection in MANET
ICTCS '16: Proceedings of the Second International Conference on Information and Communication Technology for Competitive StrategiesA MANET is a collection of self-configured node connected with wireless links. Each node of a mobile ad hoc network acts as a router and finds out a suitable route to forward a packet from source to destination. This network is applicable in areas where ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Rajagopala Chidambaram,
- P. Venkat Rangan,
- Satish K. Tripathi,
- Prasant Mohapatra,
- Program Chairs:
- Maneesha V. Ramesh,
- Maarten van Steen
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Poster
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 270Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in