Impact Factor:6.549
Scopus Suggested Journal: |
International Journal
of Computer Engineering in Research Trends (IJCERT)
Scholarly, Peer-Reviewed, Open Access and Multidisciplinary
International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed,Open Access and Multidisciplinary
ISSN(Online):2349-7084 Submit Paper Check Paper Status Conference Proposal
[1] K. Al Agha, M.-H. Bertin, T. Dang, A. Guitton, P. Minet, T. Val, and J.-B.‖Viollet,‖“Which‖wireless‖ technology for industrial wireless sensor networks?‖ The‖ development‖ of‖ OCARI‖ technol,â€â€– IEEE Trans. Ind. Elec- tron., vol. 56, no. 10, pp. 4266–4278, Oct. 2009. [2] R. Akbani, T. Korkmaz, and G. V. S. Raju, “Mobile‖ Ad‖ hoc‖ Net- work‖ Security,â€â€– in‖ Lecture‖ Notes in Electrical Engineering, vol. 127. New York: Springer-Verlag, 2012, pp. 659–666. [3]‖R.‖H.‖Akbani,‖S.‖Patel,‖and‖D.‖C.‖Jinwala,‖“DoS‖ attacks‖ in‖ mobile‖ ad‖ hoc‖ networks:‖ A‖ survey,â€â€– in‖ Proc. 2nd Int. Meeting ACCT, Rohtak, Haryana, India, 2012, pp. 535–541. [4]‖ T.‖ Anantvalee‖ and‖ J.‖ Wu,‖ “A‖ Survey‖ on‖ Intrusion‖Detection‖in‖Mobile‖Ad‖Hoc‖Networks,â€â€– in Wireless/Mobile Security. New York: SpringerVerlag, 2008. [5] L. Buttyan and J. P. Hubaux, Security and Cooperation in Wireless Networks. Cambridge, U.K.: Cambridge Univ. Press, Aug. 2007. [6] D. Dondi, A. Bertacchini, D. Brunelli, L. Larcher,‖ and‖ L.‖ Benini,‖ “Model- ing and optimization of a solar energy harvester system for self-powered‖ wireless‖ sensor‖ networks,â€â€– IEEE‖ Trans. Ind. Electron., vol. 55, no. 7, pp. 2759–2766, Jul. 2008. [7]‖ V.‖ C.‖ Gungor‖ and‖ G.‖ P.‖ Hancke,‖ “Industrial‖ wireless sensor networks: Challenges, design principles,‖ and‖ technical‖ approach,â€â€– IEEE‖ Trans.‖ Ind. Electron., vol. 56, no. 10, pp. 4258–4265, Oct. 2009. [8] Y. Hu, D. Johnson, and A. Perrig,‖ “SEAD:‖ Secure‖ efficient‖ distance‖ vector‖ routing‖ for‖mobile‖ wireless‖ ad‖ hoc‖ networks,â€â€– in‖ Proc.‖ 4th‖ IEEE‖ Workshop Mobile Comput. Syst. Appl., 2002, pp. 3–13. [9]‖Y.‖Hu,‖A.‖Perrig,‖ and‖D.‖ Johnson,‖ “ARIADNE:‖ A secure on-demand rout- ing protocol for ad hoc networks,â€â€–in‖Proc.‖8th‖ACM‖Int.‖Conf.‖MobiCom,‖ Atlanta, GA, 2002, pp. 12–23. [10]‖ G.‖ Jayakumar‖ and‖ G.‖ Gopinath,‖ “Ad‖ hoc‖ mobile wireless networks rout- ing protocol—A review,â€â€–J.‖Comput.‖Sci.,‖vol.‖3,‖no.‖8,‖pp.‖574–582, 2007. [11] D. Johnson and D. Maltz,‖ “Dynamic‖ Source‖ Routing‖ in‖ ad‖ hoc‖ wireless‖ networks,â€â€– in‖ Mobile‖ Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153–181. [12] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting‖ misbehaving‖ nodes‖ in‖ MANETs,â€â€– in‖ Proc. 12th Int. Conf. iiWAS, Paris, France, Nov. 8– 10, 2010, pp. 216–222. [13] N. Kang, E. Shakshuki, and T. Sheltami, “Detecting‖ forged‖ acknowl- edgements in MANETs,â€â€– in‖ Proc.‖ IEEE‖ 25th‖ Int.‖ Conf.‖ AINA,‖ Biopolis, Singapore, Mar. 22–25, 2011, pp. 488–494. [14] K. Kuladinith, A. S. Timm-Giel, and C. Görg, “Mobile‖ ad-hoc commu- nications in AEC industry,â€â€– J.‖ Inf.‖ Technol.‖ Const.,‖ vol.‖ 9,‖ pp.‖ 313– 323, 2004. [15] J.-S.‖ Lee,‖ “A‖ Petri‖ net‖ design‖ of‖ command‖ filters‖ for‖ semiautonomous‖ mobile‖ sensor‖ networks,â€â€– IEEE‖ Trans.‖ Ind.‖ Electron.,‖ vol.‖ 55,‖ no.‖ 4, pp. 1835–1841, Apr. 2008. [16] K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan,‖ “An‖ acknowledgment-based approach for the detection of routing misbehaviour‖ in‖ MANETs,â€â€– IEEE‖ Trans.‖ Mobile‖ Comput., vol. 6, no. 5, pp. 536–550, May 2007. [17] S. Marti, T. J. Giuli, K. Lai, and M. Baker, “Mitigating‖ routing‖ misbe- haviour in mobile ad hoc‖ networks,â€â€– in‖ Proc.‖ 6th‖ Annu.‖ Int.‖ Conf.‖ Mobile Comput. Netw., Boston, MA, 2000, pp. 255– 265. [18] A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography. Boca Raton, FL: CRC, 1996, T-37. [19]‖ N.‖ Nasser‖ and‖ Y.‖ Chen,‖ “Enhanced‖ intrusion‖ detection systems for dis- covering malicious nodes in mobile ad hoc‖network,â€â€–in‖Proc.‖IEEE‖Int.‖ Conf. Commun., Glasgow, Scotland, Jun. 24–28, 2007, pp. 1154–1159. [20] J. Parker, J. Undercoffer, J. Pinkston, and A. Joshi,‖ “On‖ intrusion‖ detection‖ and‖ response‖ for‖ mobile‖ ad‖hoc‖networks,â€â€–in‖Proc.‖ IEEE‖ Int.‖Conf.‖ Perform., Comput., Commun., 2004, pp. 747–752. [21]‖ A.‖ Patcha‖ and‖ A.‖ Mishra,‖ “Collaborative‖ security architecture for black hole attack prevention‖ in‖ mobile‖ ad‖ hoc‖ networks,â€â€– in‖ Proc.‖ Radio Wire- less Conf., 2003, pp. 75–78. [22] A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and‖T.‖Karygiannis,‖“Secure‖routing‖and‖intrusion‖ detection‖ in‖ ad‖ hoc‖ networks,â€â€– in‖ Proc.‖ 3rd‖ Int.‖ Conf. Pervasive Comput. Commun., 2005, pp. 191– 199. [23]‖ R.‖ Rivest,‖ A.‖ Shamir,‖ and‖ L.‖ Adleman,‖ “A‖ method for obtaining digital signatures and publickey‖cryptosystems,â€â€–Commun.‖ACM,‖vol.‖21,‖no.‖2,‖ pp. 120–126, Feb. 1983. [24] J. G. Rocha, L. M. Goncalves, P. F. Rocha, M. P. Silva, and S. Lanceros- Mendez,‖ “Energy‖ harvesting from piezoelectric materials fully integrated‖in‖footwear,â€â€–IEEE‖Trans. Ind. Electron., vol. 57, no. 3, pp. 813–819, Mar. 2010. [25] T. Sheltami, A. Al-Roubaiey, E. Shakshuki, and A.‖ Mahmoud,‖ “Video‖ transmissionenhancementinpresenceofmisbehavin gnodesinMANETs,â€â€– Int.‖ J.‖ Multimedia‖ Syst.,‖ vol.‖ 15, no. 5, pp. 273–282, Oct. 2009. [26] A. Singh, M. Maheshwari, and N. Kumar, “Security‖ and‖ trust‖ management‖ in‖ MANET,â€â€– in‖ Communications in Computer and Information Science, vol. 147. New York: Springer-Verlag, 2011, pt. 3, pp. 384–387. [27]‖ B.‖ Sun,‖ “Intrusion‖ detection‖in‖mobile‖ ad hoc networks,â€â€–Ph.D.‖disserta- tion, Texas A&M Univ., College Station, TX, 2004. [28] K. Stanoevska-Slabeva and M. Heitmann, “Impact‖of‖mobile‖ad-hoc net- works on the mobile value‖system,â€â€–in‖Proc.‖ 2nd‖Conf.‖m-Bus., Vienna, Austria, Jun. 2003. [29] A. Tabesh‖ and‖L.‖G.‖Frechette,‖ “A‖low-power stand-alone adaptive circuit for harvesting energy from‖ a‖ piezoelectric‖micropower‖ generator,â€â€– IEEE‖ Trans. Ind. Electron., vol. 57, no. 3, pp. 840–849, Mar. 2010. [30]‖ M.‖ Zapata‖ and‖ N.‖ Asokan,‖ “Securing‖ ad‖ hoc‖ routing‖ protocols,â€â€– in‖ Proc.‖ ACM‖ Workshop‖ Wireless Secur., 2002, pp. 1–10. [31]‖ L.‖ Zhou‖ and‖ Z.‖ Haas,‖ “Securing‖ ad-hoc networks,â€â€– IEEE‖ Netw.,‖ vol.‖ 13,‖ no.‖ 6,‖ pp.‖ 24–30, Nov./Dec. 1999. [32] Botan, A Friendly C ++ Crypto Library. [Online]. Available: http:// botan.randombit.net/1098 IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, VOL. 60, NO. 3, MARCH 2013
![]() | V1I617.pdf |
Latest issue :Volume 10 Issue 1 Articles In press
☞ INVITING SUBMISSIONS FOR THE NEXT ISSUE : |
---|
☞ LAST DATE OF SUBMISSION : 31st March 2023 |
---|
☞ SUBMISSION TO FIRST DECISION : In 7 Days |
---|
☞ FINAL DECISION : IN 3 WEEKS FROM THE DAY OF SUBMISSION |
---|