Login / Signup
Evaluating an Authenticated Trust based Adhoc on demand Distance Vector for Malicious Nodes Isolation in MANET.
A. Sumathi
B. Vinayagasundaram
Published in:
J. Comput. Sci. (2014)
Keyphrases
</>
mobile ad hoc networks
malicious nodes
network nodes
routing protocol
malicious behavior
cooperative
wireless sensor networks
real time
cloud computing
energy efficient