Login / Signup
Mitigating Malicious Attacks Using Trust Based Secure-BEFORE Routing Strategy in Mobile Ad Hoc Networks.
Rutuja Shah
Sumathy Subramaniam
Dhinesh Babu Lekala Dasarathan
Published in:
J. Comput. Inf. Technol. (2016)
Keyphrases
</>
malicious attacks
qos routing
routing algorithm
mobile ad hoc networks
secure routing
routing protocol
ad hoc networks
database
response time
shortest path
network topology
routing problem
mobile nodes
wireless ad hoc networks
mobile wireless