1.
Pathan, Muhammad Salman, Nafei Zhu, Jingsha He, Zulfiqar Ali Zardari, Muhammad Qasim Memon, and Muhammad Iftikhar Hussain. 2018. "An Efficient Trust-Based Scheme for Secure and Quality of Service Routing in MANETs" Future Internet 10, no. 2: 16. https://doi.org/10.3390/fi10020016.
2.
Kumar, M., Bhandari, R., Rupani, A., & Ansari, J. H. (2018, June). Trust-based Performance Evaluation of Routing Protocol Design with Security and QoS over MANET. In 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE) (pp. 139-142). IEEE
3.
Singh, S., Chawla, M., Prasad, D., Anand, D., Alharbi, A., & Alosaimi, W. An Improved Binomial Distribution-Based Trust Management Algorithm for Remote Patient Monitoring in WBANs. Sustainability, 14(4), 2141, 2022.
4.
R. Ferdous, V. Muthukumarasamy, and A. Sattar. A Node-based Trust Management Scheme forMobile Ad-Hoc Networks. Proceedings of the 4thInternationalConference on Network and SystemSecurity (NSS), pp. 275–280, 2010
5.
Lwin, M. T., Yim, J., & Ko, Y. B. (2020). Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors, 20(3), 698.
6.
Harold Robinson, Y., & Golden Julie, E. (2019). MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks. Wireless Personal Communications, 109(2), 739-760.
7.
Am, A. B. (2021). High energy efficient lifetime management system and trust management framework for manet using self-configurable cluster mechanism. Peer-to-Peer Networking and Applications, 14(3), 1229-1241.
8.
Gayathri, D., & Raman, S. J. (2017, January). Pltrust AODV: Physical logical factor estimated trust embedded AODV for optimised routing in Manets. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS) (pp. 1-5). IEEE.
9.
Sheikh MS, Liang J, Wang W. Security and privacy in vehicular ad hoc network and vehicle cloud computing: a survey. Wireless Communications and Mobile Computing. 2020 Jan 17;2020.
10.
Vaseer, G., Ghai, G., &Ghai, D. (2018, December). Distributed Trust-Based Multiple Attack Prevention for Secure MANETs. In 2018 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS) (pp. 108-113). IEEE.
11.
Wadhwani, G. K., Khatri, S. K., & Mutto, S. K. (2020). Trust framework for attack resilience in MANET using AODV. Journal of Discrete Mathematical Sciences and Cryptography, 23(1), 209-220.
12.
Rajkumar, B., & Narsimha, G. (2016). Trust based certificate revocation for secure routing in MANET. Procedia Computer Science, 92, 431-441.
13.
Rahmani M, Benchaiba M. A comparative study of replication schemes for structured P2P networks[C]. Proc of the 9th Int Conf on Internet and Web Applications and Services. Lisbon, 2014: 147-158.
14.
Lu, K. D., Zeng, G. Q., Luo, X., Weng, J., Zhang, Y., & Li, M. (2020). An adaptive resilient load frequency controller for smart grids with DoS attacks. IEEE Transactions on Vehicular Technology, 69(5), 4689-4699.
15.
De la Rocha, A., Dias, D., & Psaras, Y. (2021). Accelerating Content Routing with Bitswap: A multi-path file transfer protocol in IPFS and Filecoin.
16.
Elbreiki W, Hassan S, Habbal A, et al. A Comparative study of chord and pastry for the name resolution system implementation in information centric networks[C]. The 4th Int Conf on Internet Applications, Protocols and Services. Kuala Lumpur: IEEE, 2015: 359-367.
17.
Naik, A. R., & Keshavamurthy, B. N. (2020). Next level peer-to-peer overlay networks under high churns: a survey. Peer-to-Peer Networking and Applications, 13(3), 905-931.
18.
Djellabi, B., Amad, M., & Baadache, A. (2022). Handfan: A flexible peer-to-peer service discovery system for internet of things applications. Journal of King Saud University-Computer and Information Sciences.
19.
Seddiki M, Benchaïba M. SWS: A smart walk mechanism for resources search in unstructured mobile P2P networks[C]. The 1st Int Conf on New Technologies of Information and Communication. Cairo: IEEE, 2015: 1-6.
20.
An, N., Liang, X., Zheng, X., Yuan, S., Wang, X., & Guan, Z. (2022, May). Achieving Secure and Efficient P2P Data Trading based on Blockchain for Internet of Things. In Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure (pp. 139-144).
21.
Attkan, A., & Ranga, V. (2022). Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security. Complex & Intelligent Systems, 1-33.
22.
Wang S M, Ye D D, Huang X M, et al. Consortium blockchain for secure resource sharing in vehicular edge computing: a contract-based approach. IEEE Transactions on Network Science and Engineering, 2021, 8(2): 1189-1201.
23.
Y. S. Ha, J. C. Shim. “Wild Animal Repellent System for Prevention of Crop Damage by Wild Boars,” Journal of Korea Multimedia Society, Vol. 24, No. 2, pp. 215-221, February 2021.
24.
Keum, D., & Ko, Y. B. (2022). Trust-Based Intelligent Routing Protocol with Q-Learning for Mission-Critical Wireless Sensor Networks. Sensors, 22(11), 3975.
25.
Srilakshmi, U., Alghamdi, S. A., Vuyyuru, V. A., Veeraiah, N., & Alotaibi, Y. (2022). A secure optimization routing algorithm for mobile ad hoc networks. IEEE Access, 10, 14260-14269.