A Survey on Trust Evaluation in Mobile Ad Hoc Networks
Abstract
References
Recommendations
Source based trusted AODV routing protocol for mobile ad hoc networks
ICACCI '12: Proceedings of the International Conference on Advances in Computing, Communications and InformaticsIn Mobile Ad hoc Networks (MANETs), nodes (mobile devices) are located in a self organized way without any infrastructure forming a temporary network. Each node in a MANET moves independently in any direction, thus the network's topology change rapidly ...
Key Management in Web of Trust for Mobile Ad Hoc Networks
AINA '09: Proceedings of the 2009 International Conference on Advanced Information Networking and ApplicationsA mobile ad hoc network MANET is a collection ofwireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Trust establishment and management are essential for any ...
Routing with adaptive path and limited flooding for mobile ad hoc networks
In MANET, each mobile host can freely move around and the network topology is dynamically changing. To send a datagram, a source host broadcasts a route discovery packet to the network. All neighboring nodes receiving this packet will rebroadcast this ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Other conferences](/cms/asset/d913c49f-a876-46fb-9b87-859b0223c4fe/3021385.cover.jpg)
In-Cooperation
- EAI: The European Alliance for Innovation
- SIGMM: ACM Special Interest Group on Multimedia
Publisher
ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)
Brussels, Belgium
Publication History
Check for updates
Author Tags
Qualifiers
- Tutorial
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 130Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in