Login / Signup

Evaluating an Authenticated Trust based Adhoc on demand Distance Vector for Malicious Nodes Isolation in MANET.

A. SumathiB. Vinayagasundaram
Published in: J. Comput. Sci. (2014)
Keyphrases
  • mobile ad hoc networks
  • malicious nodes
  • network nodes
  • routing protocol
  • malicious behavior
  • cooperative
  • wireless sensor networks
  • real time
  • cloud computing
  • energy efficient