Security scheme for malicious node detection in mobile ad hoc networks

被引:0
|
作者
Rathod, P [1 ]
Mody, N
Gada, D
Gogri, R
Dedhia, Z
Sanyal, S
Abraham, A
机构
[1] Mumbai Univ, Bombay, Maharashtra, India
[2] Tata Inst Fundamental Res, Sch Technol & Comp Sci, Bombay, Maharashtra, India
[3] Chung Ang Univ, Sch Comp Sci & Engn, Chung Ang, South Korea
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:541 / 542
页数:2
相关论文
共 50 条
  • [1] DETECTION OF MALICIOUS NODE IN MOBILE AD-HOC NETWORK
    Sangeetha, V
    Kumar, S. Swapna
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON POWER, SIGNALS, CONTROL AND COMPUTATION (EPSCICON), 2018,
  • [2] Malicious node detection in ad-hoc wireless networks
    Griswold, RL
    Medidi, S
    [J]. DIGITAL WIRELESS COMMUNITCATIONS V, 2003, 5100 : 40 - 50
  • [3] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [4] An efficient scheme for detecting malicious nodes in mobile ad hoc networks
    Choi, Jongoh
    Cha, Si-Ho
    Song, JooSeok
    [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 179 - 193
  • [5] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks
    Rahman, Mohsin Ur
    Abbas, Sohail
    Latif, Seemab
    [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
  • [6] Recommendation Trust for Improved Malicious Node Detection in Ad hoc Networks
    Ahmed, Saneeha
    Tepe, Kemal
    [J]. 2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [7] Cluster based security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. WIMOB 2006: 2ND IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, PROCEEDINGS, 2006, : 391 - +
  • [8] Research on the Security Scheme of Clustering in Mobile Ad Hoc Networks
    Yao, Yu
    Zhe, Li
    Jun, Liu
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 518 - 521
  • [9] Node Level Security Management and Authentication in Mobile Ad Hoc Networks
    Savola, Reijo M.
    [J]. MDM: 2009 10TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT, 2009, : 449 - 458
  • [10] Security in Mobile Ad Hoc Networks
    Khanpara, Pimal
    Trivedi, Bhushan
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION AND NETWORKS, 2017, 508 : 501 - 511