References
- Islabudeen, M., and Kavitha Devi, M.K. ,"A Smart Approach for Intrusion Detection and Prevention System in Mobile Ad Hoc Networks Against Security Attacks," Wireless Personal Communications, Vol.112, No.02, pp:193-224, January 2020. DOI: https://doi.org/10.1007/s11277-019-07022-5.
- Liu F., and Heijenk G., Wired/Wireless Internet Communications. Lecture Notes in Computer Science, pp.13, 2006.
- Das, S.K., Yadav A.K., and Tripathi, S., "IE2M: Design of intellectual energy efficient multicast routing protocol for ad-hoc network," Peer-to-Peer Networking and Applications, Vol.10, No.03, pp: 670-687, November 2016. DOI: https://doi.org/10.1007/s12083-016-0532-6.
- The Institute of Internet, Bitcoin: A peer-to-peer electronic cash system, S. Nakamoto. https://bitco.in/pdf/bitcoin.pdf.
- A. Azaria, A. Ekblaw, T. Vieira, and A. Lippman, "Medrec: Using Blockchain for Medical Data Access and Permission Management," in Pro. 2nd International Conference on Open and Big Data (OBD), pp.25-30, Aug. 22-24, 2016.
- Waheb A. Jabbar, Mahamod Ismail, and Rosdiadee Nordin, "Multi-criteria based multipath OLSR for battery and queue-aware routing in multi-hop ad hoc wireless networks," Wireless Networks, Vol.21, No.22, pp: 1309-1326, November 2014. DOI: https://doi.org/10.1007/s11276-014-0857-0.
- Gaurav Pathak, and Krishan Kumar, "Traffic aware load balancing in AOMDV for mobile Ad-hoc networks," Journal of Communications & Information Networks, Vol.2, No.28, pp:123-130, June 2017. DOI: https://doi.org/10.1007/s41650-017-0012-z.
- K.Rama Abirami, and M.G.Sumithra, "Evaluation of neighbor credit value based AODV routing algorithms for selfish node behavior detection," Cluster Computing, Vol.22, No.13, pp: 13307-13316, January 2018. DOI: https://doi.org/10.1007/s10586-018-1851-6.
- Wai Chen, Ratul K.Guha, Taek Jin Kwon, Jone Lee , and Yuanying Hsu, "A survey and challenges in routing and data dissemination in vehicular ad hoc networks," Wireless Communications & Mobile Computing, Vol.11, No.7, pp:787-795, July 2011. DOI: https://doi.org/10.1002/wcm.862.
- C.-K. TOH, Ad Hoc Mobile Wireless Networks: Protocols and Systems. Prentice Hall PTR, pp.192,2002.
- The Institute of Internet, ns-3 project, ns-3 manual. https://www. nsnam.org/docs/manual/html/index.html.
- N. S. Nizamkari, "A graph-based trust-enhanced recommender system for service selection in IOT," in Pro International Conference on Inventive Systems and Control (ICISC), pp. 1-5, Jan.19-20, 2017.
- H. Sukhwani ,J. M. Martínez , X. Chang, K. S. Trivedi , and A. Rindos, "Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)," in Pro 36th Symposium on Reliable Distributed Systems (SRDS), pp. 1-3, Sept.26-29, 2017.
- S. Kadam, D. Prabhu, N. Rathi, P. Chaki, and G. S. Kasbekar, "Exploiting group structure in MAC protocol design for multichannel Ad Hoc cognitive radio networks," IEEE Transactions on Vehicular Technology, Vol.68, No.1, pp:893-907, Jan. 2019. DOI: https://doi.org/10.1109/TVT.2018.2883392.
- P. Charles, B. Elizabeth, "Ad-hoc On-Demand Distance Vector Routing," Proc. 2nd IEEE Workshop on Mobile Computing Syst. and Applications (WMCSA '99), February 25-26, 1999, New Orleans, LA, USA, Vol. 25, No.1, pp:90-100, Feb., 1999. DOI: 10.1109/MCSA.1999.749281