To Eliminate Node-Misbehaviour Using Path Tracing Algorithm with Elliptical Curve Cryptography in Wireless Adhoc Network
Abstract
Keywords
Full Text:
PDFReferences
Dikshita Agarwal, Rashmi Ranjan Rout, Sadam Ravichandra,”Detection of node misbehaviour using overhearing and autonomous agent in wireless adhocnetwork”IEEE2015.
A. S. Anandukey and C. M., “Detection of packet dropping attack using improved acknowledgement based scheme in manet,” International Journal of Computer Science Issues I, vol. 7, no. 1, pp. 12–17, 2010.
S. Manvia, L. B. Bhajantrib, and V. K. Vagga, “Routing misbehavior detection in manets using 2ack,” Journal of Telecommunication and Information Technology, vol. 4, no. 1, pp. 105–111, 2010.
L. Buttyan and J. P. Hubaux, “Stimulating cooperation in self-organizing mobileadhoc networks,” Mobile Net. and Application, vol. 8, no. 5, pp. 579–592, 2003.
J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, “Modelling incentive forcollabration in mobile adhoc network,” in Proc. of WiOpt, 2003.
S. Ganeriwal, L. Balzano, and M. Srivastava, “Reputation based framework for high integrity sensor networks,” ACM Transactions on Sensor Networks, vol. 4, no. 3, pp. 1–37, 2008.
Q. He, D. Wu, and K. Khosla, “Sori: A secure and objective reputation based incentive scheme for adhoc networks,” in In Proc. of WCNC, 2004.
S. Buchegger and J. Y. L. Boudec, “Self-policing mobile adhoc networks by reputation systems,” in IEEE Comm. Magazine, 2005, pp. 101–107.
L. Miranda, H.and Rodrigues, “Preventing selfishness in open mobile adhoc networks,” in Proc. of Seventh CaberNet Radicals Workshop, 2002.
S. Buchegger and J. Y. L. Boudec, “Performance analysis of the confidant protocol: Cooperation of nodes, fairness in dynamic ad-hoc networks,” in Proc. of MobiHoc, 2002.
P. Michiardi and R. C. Molva, “A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks,” in The 6th IFIP Communication and Multimedia Security Conference, Portoroz, Slovenia, Sep 26-27, 2002, 2002.
K. Balakrishnan, J. Deng, and P. K. Varshney, “Twoack: Preventing selfish node in mobile adhoc networks,” in Proc. of WCNC, 2005.
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotary, and H. Rubens, “Odsbr: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks,” ACM Transactions on Information Syatem Security, vol. 10, no. 4, pp. 11–35, 2008.
Y. Xue and K. Nahrstedt, “Providing fault- tolerant ad-hoc routing services in adversialenviornment,” Wireless Personal Communications, special issue on security for next generation communications, vol. 29, no. 3, pp. 367–388, 2004.
Y. Zhang, L. Lazos, and W. J. Kozma, “Amd: Audit baesdmisbehavior detection in wireless ad hoc networks,” IEEE Transactions on Mobile Computing, 2013.
R. Perrig, A. Canetti, J. D. Tygar, and D. Song, “The tesla broadcast authentication protocol,” in CryptoBytes, vol. 5, no. 2, 2002, pp. 2–13.
S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating routing misbehavior in mobile ad hoc networks,” in In Proc. MobiHoc, 2000.
S. Samreen and G. Narasimha, “An efficient approach for detection of nodemisbehavior in a manet based on link behavior,” IEEE International Journal of Advance Computing Conference, pp. 588–592, 2012.
L. Buttyan and J. P. Hubaux, “Enforcing service availability in mobile ad-hoc wans,” in In Proc. MobiHoc, 2000.
V. Bharghavan, A. Dermers, S. Shenker, and L. Zhang, “Macaw: A medium access protocol for wireless lans,” in In Proc. of ACM SIGCOMM ’94, 1994.
D. Johnson, A. Maltz, and J. Broch, “The dynamic protocol for mobile ad hoc networks,” in Mobile Ad-hoc Network Working Group, IETF, 1999.
G. Simon, P. Vlgyesi, M. Marti, and A. Ldeczi, “Simulation-based optimization of communication protocols for large-scale wireless sensor networks,” IEEE CA, 2003.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.