Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Trust computations and trust dynamics in mobile adhoc networks: A survey
Trust is an important aspect of mobile adhoc networks (MANETs). It enables entities to cope
with uncertainty and uncontrollability caused by the free will of others. Trust computations …
with uncertainty and uncontrollability caused by the free will of others. Trust computations …
Light-weight trust-based routing protocol for mobile ad hoc networks
Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment.
To use them in hostile environments, trust-based routing can be used, where instead of …
To use them in hostile environments, trust-based routing can be used, where instead of …
A trust-based framework for data forwarding in opportunistic networks
In general, the encounter probability is leveraged to evaluate whether a node is a qualified
next-hop forwarder in Opportunistic Networks (OppNets); however, it does not truly present …
next-hop forwarder in Opportunistic Networks (OppNets); however, it does not truly present …
RADON: reputation-assisted data forwarding in opportunistic networks
In opportunistic networks, the probability of encountering a destination node is popularly
used to select a qualified forwarder; however, it can not represent the competency of …
used to select a qualified forwarder; however, it can not represent the competency of …
A dynamic trust establishment and management framework for wireless sensor networks
In this paper, we present a trust establishment and management framework for hierarchical
wireless sensor networks. The wireless sensor network architecture we consider consists of …
wireless sensor networks. The wireless sensor network architecture we consider consists of …
Analysing the Performance of a Trust-Based AODV in the Presence of a Flooding Attack
Mobile ad hoc networks (MANETs) are wireless multi-hop networks that do not rely on any
fixed infrastructure, unlike traditional networks. Nodes in MANETs are formed dynamically …
fixed infrastructure, unlike traditional networks. Nodes in MANETs are formed dynamically …
Black hole attack and their counter measure based on trust management in manet: A survey
U Venkanna, RL Velusamy - 3rd international conference on …, 2011 - ieeexplore.ieee.org
Mobile ad-hoc network (MANET) is an autonomous system connected by mobile nodes with
wireless links. Due to absence of infrastructure, MANET is used in various applications, such …
wireless links. Due to absence of infrastructure, MANET is used in various applications, such …
Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET
Applying the ad hoc network on vehicles has formed a new kind of network called VANET.
The higher speed of the nodes (vehicles) and frequent change in network topology make …
The higher speed of the nodes (vehicles) and frequent change in network topology make …
Team: Trust enhanced security architecture for mobile ad-hoc networks
V Balakrishnan, V Varadharajan… - 2007 15th IEEE …, 2007 - ieeexplore.ieee.org
Security is paramount in mobile ad-hoc networks (MANET) as they are not conducive to
centralized trusted authorities. Several solutions have been proposed for MANET in the …
centralized trusted authorities. Several solutions have been proposed for MANET in the …
Methods systems, and devices for robustness improvement in a mobile ad hoc network using reputation-based routing
A Das, S Das - US Patent 8,774,192, 2014 - Google Patents
Network (MANET) in which an intermediate relay node may engage in discreet packet-
drop** practices for selfish (eg, to conserve power) or other reasons. Each node in Such a …
drop** practices for selfish (eg, to conserve power) or other reasons. Each node in Such a …