Search Results

There are 7142 results for: content related to: Trust-based routing method using a mobility-based clustering approach in mobile ad hoc networks

  1. Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

    Security and Communication Networks

    Volume 9, Issue 14, 25 September 2016, Pages: 2484–2556, Sunil Kumar and Kamlesh Dutta

    Version of Record online : 5 MAY 2016, DOI: 10.1002/sec.1484

  2. Analysis and taxonomy of security/QoS tradeoff solutions for the future internet

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2778–2803, Ana Nieto and Javier Lopez

    Version of Record online : 17 JUL 2013, DOI: 10.1002/sec.809

  3. Overlay tunneling as a policy tool for defending mobile ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 17, 25 November 2016, Pages: 4482–4494, Xiruo Liu and Wade Trappe

    Version of Record online : 6 OCT 2016, DOI: 10.1002/sec.1640

  4. A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 376–384, Mohammad S. Obaidat, Isaac Woungang, Sanjay Kumar Dhurandher and Vincent Koo

    Version of Record online : 22 FEB 2013, DOI: 10.1002/sec.731

  5. On the mobile relay placement in hybrid MANETs with secure network coding

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 738–749, Jin Wang and Kejie Lu

    Version of Record online : 30 MAY 2013, DOI: 10.1002/sec.775

  6. Security and trust management in opportunistic networks: a survey

    Security and Communication Networks

    Volume 8, Issue 9, June 2015, Pages: 1812–1827, Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang and Ping Yi

    Version of Record online : 18 SEP 2014, DOI: 10.1002/sec.1116

  7. Towards cross-layer approaches to coping with misbehavior in mobile ad hoc networks: an anatomy of reputation systems

    Security and Communication Networks

    Volume 8, Issue 2, 25 January 2015, Pages: 232–244, Shuzhen Wang, Zonghua Zhang and Farid Naït-Abdesselam

    Version of Record online : 17 MAR 2014, DOI: 10.1002/sec.976

  8. Virtual private key generator based escrow-free certificateless public key cryptosystem for mobile ad hoc networks

    Security and Communication Networks

    Volume 6, Issue 1, January 2013, Pages: 49–57, Xixiang Lv, Hui Li and Baocang Wang

    Version of Record online : 9 MAY 2012, DOI: 10.1002/sec.529

  9. A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 5, 25 March 2016, Pages: 420–428, Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat (GE) and Rajender Dheeraj Peddi

    Version of Record online : 21 MAR 2013, DOI: 10.1002/sec.766

  10. Self-organizing life cycle management of mobile ad hoc networks

    Security and Communication Networks

    Volume 5, Issue 10, October 2012, Pages: 1147–1158, Cándido Caballero-Gil, Pino Caballero-Gil and Jezabel Molina-Gil

    Version of Record online : 7 MAR 2012, DOI: 10.1002/sec.513

  11. An ID-based node key management scheme based on PTPM in MANETs

    Security and Communication Networks

    Volume 9, Issue 15, October 2016, Pages: 2816–2826, Guang Yang, Jiqiang Liu and Lei Han

    Version of Record online : 12 MAR 2015, DOI: 10.1002/sec.1206

  12. Secure publish/subscribe-based certificate status validations in mobile ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 6, April 2015, Pages: 1063–1076, Mohammad Masdari, Sam Jabbehdari and Jamshid Bagherzadeh

    Version of Record online : 24 AUG 2014, DOI: 10.1002/sec.1062

  13. PoliCon: a policy conciliation framework for heterogeneous mobile ad hoc networks

    Security and Communication Networks

    Volume 8, Issue 3, February 2015, Pages: 418–430, Soumya Maity, Soumya K. Ghosh and Ehab Al-Shaer

    Version of Record online : 4 JUL 2014, DOI: 10.1002/sec.990

  14. SeCRoP: secure cluster head centered multi-hop routing protocol for mobile ad hoc networks

    Security and Communication Networks

    Volume 9, Issue 16, 10 November 2016, Pages: 3378–3387, Muhammad Muneer Umar, Amjad Mehmood and Houbing Song

    Version of Record online : 4 JUL 2016, DOI: 10.1002/sec.1544

  15. Security bootstrapping of mobile ad hoc networks using identity-based cryptography

    Security and Communication Networks

    Volume 9, Issue 11, 25 July 2016, Pages: 1374–1383, Kamal Adli Mehr and Javad Musevi Niya

    Version of Record online : 1 FEB 2016, DOI: 10.1002/sec.1423

  16. Embedded Systems Security: A Survey of EU Research Efforts

    Security and Communication Networks

    Volume 8, Issue 11, 25 July 2015, Pages: 2016–2036, Charalampos Manifavas, Konstantinos Fysarakis, Alexandros Papanikolaou and Ioannis Papaefstathiou

    Version of Record online : 23 DEC 2014, DOI: 10.1002/sec.1151

  17. Mitigating colluding injected attack using monitoring verification in mobile ad-hoc networks

    Security and Communication Networks

    Volume 6, Issue 4, April 2013, Pages: 539–547, Farah Kandah, Yashaswi Singh, Weiyi Zhang and Chonggang Wang

    Version of Record online : 18 FEB 2013, DOI: 10.1002/sec.681

  18. Comparative study of trust and reputation systems for wireless sensor networks

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 669–688, Osman Khalid, Samee U. Khan, Sajjad A. Madani, Khizar Hayat, Majid I. Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally and Dan Chen

    Version of Record online : 5 JUL 2012, DOI: 10.1002/sec.597

  19. A secure IPv6 address configuration scheme for a MANET

    Security and Communication Networks

    Volume 6, Issue 6, June 2013, Pages: 777–789, Xiaonan Wang and Yi Mu

    Version of Record online : 13 AUG 2012, DOI: 10.1002/sec.611

  20. Exploiting convergence characteristics to tackle collusion attacks in OLSR for Security and Communication Networks

    Security and Communication Networks

    Volume 7, Issue 1, January 2014, Pages: 108–122, Manoj Singh Gaur, Rajbir Kaur, Lalith P. Suresh and Vijay Laxmi

    Version of Record online : 17 APR 2012, DOI: 10.1002/sec.545