Journal of Mobile Communication

Year: 2020
Volume: 14
Issue: 4
Page No. 39 - 42

Secured Multicast Routing Protocol for Wireless Sensor Networks

Authors : S. Navaneethan and A. Kathirvel

References

Deering, S.E., 1988. Multicast routing in internetworks and extended LANs. Proceedings of the Symposium on Communications Architectures and Protocols, August 16-18, 1988, ACM, New York, USA., pp: 55-64.

Kathirvel, A. and R. Srinivasan, 2011. ETUS: An enhanced triple umpiring system for security and performance improvement of mobile Ad hoc networks. Int. J. Network Manage., 21: 341-359.
CrossRef  |  Direct Link  |  

Kathirvel, A. and R. Srinivasan, 2011. ETUS: Enhanced triple umpiring system for security and robustness of wireless mobile Ad hoc networks. Int. J. Commun. Networks Distrib. Syst., 7: 153-187.
CrossRef  |  Direct Link  |  

Kefayati, M., H.R. Rabiee, S.G. Miremadi and A. Khonsari, 2006. Misbehavior resilient multi-path data transmission in mobile ad-hoc networks. Proceedings of the 4th ACM Workshop on Security of Ad Hoc and Sensor Networks, October 30, 2006, ACM, New York, USA., pp: 91-100.

Koblitz, N., 1987. Elliptic curve cryptosystems. Math. Comput., 48: 203-209.
Direct Link  |  

Marti, S., T.J. Giuli, K. Lai and M. Baker, 2000. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual ACM/IEEE International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, MA., USA., pp: 255-265.

Mavropodi, R., P. Kotzanikolaou and C. Douligeris, 2007. SecMR-a secure multipath routing protocol for ad hoc networks. Ad Hoc Networks, 5: 87-99.
CrossRef  |  Direct Link  |  

Xiao, B., B. Yu and C. Gao, 2007. CHEMAS: Identify suspect nodes in selective forwarding attacks. J. Parallel Distrib. Comput., 67: 1218-1230.
CrossRef  |  Direct Link  |  

Ye, F., H. Luo, S. Lu and L. Zhang, 2004. Statistical en-route filtering of injected false data in sensor networks. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM), March 7-11, Hongkong, China, pp: 2446-2457.

Zhang, X., A. Jain and A. Perrig, 2008. Packet-dropping adversary identification for data plane security. Proceedings of the 2008 ACM Conference on Emerging Network Experiment and Technology, CoNEXT 2008, December 9-12, 2008, ACM, Madrid, Spain, pp: 1-12.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved