@incollection{, BDF10064E227F7B8F07ED7DAA4F737F5 , author={{K.Sridevi} and {Muffakham Jah College of Engineering and Technology}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}163714 } @book{b0, , title={{Trust prediction and trust-based source routing in mobile ad hoc networks}} , author={{ XHui } and { JZhiping } and { Xin } and { JLei } and { HMEdwin } and { Sha }} , year={2013} , publisher={Elsevier} 11 } @incollection{b1, , title={{A Trust Management Scheme Based on Behaviour Feedback for Opportunistic Networks}} , author={{ SCh En Xi } and { MALiang } and { MAJianfeng } and { Zhuo }} , journal={{Network Technology And Application, China Communications}} , year={April 2015} } @incollection{b2, , title={{Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning}} , author={{ ZWei } and { HTang } and { FRichardYu } and { MWang } and { PMason }} , journal={{IEEE Transactions On Vehicular Technology}} 63 9 , year={November 2014} } @book{b3, , title={{Trust management in mobile ad hoc networks for bias minimization and application performance maximization}} , author={{ CIng-Ray } and { GJia } and { BFenye } and { CJin-Hee }} , year={2014} , publisher={Elsevier} } @incollection{b4, , title={{Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey}} , author={{ KGovindan } and { PMohapatra }} , journal={{IEEE Communications Surveys & Tutorials}} 14 2 , year={2012} } @incollection{b5, , title={{MAC-Layer Selfish Misbehaviour in IEEE 802.11 Ad Hoc Networks: Detection and Defence}} , author={{ MingLi } and { SSalinas } and { PanLi } and { SJinyuan } and { XHuang }} , journal={{IEEE Transactions On Mobile Computing}} 14 6 , year={June 2015} } @incollection{b6, , title={{AASR: Authenticated Anonymous Secure Routing for MANETs in Adversarial Environments}} , author={{ WLiu } and { MingY }} , journal={{IEEE Transactions On Vehicular Technology}} 63 9 , year={November 2014} } @incollection{b7, , title={{Trust establishment in cooperative wireless relaying networks}} , author={{ RChangiz } and { HHalabian } and { FRYu } and { ILambadaris } and { HTang }} , journal={{Wireless Commun. Mobile Comput}} , year={Sep. 2012} } @incollection{b8, , title={{Security and Quality of Service (QoS) co-design in cooperative mobile ad hoc networks}} , author={{ FRYu } and { HTang } and { SBu } and { ZhengD }} , journal={{EURASIP J. Wireless Commun. Netw}} 2013 , year={Jul. 2013} } @incollection{b9, , title={{Distributed resources in wireless networks: Discovery and cooperative uses}} , author={{ HSarvanko } and { MHyhty } and { MKatz } and { FFitzek }} , booktitle={{4th ERCIM eMobility Workshop in conjunction with WWIC'10}} , year={2010} } @incollection{b10, , title={{Trust management systems for wireless sensor networks: Best practices}} , author={{ JLopez } and { RRoman } and { IAgudo } and { CFGago }} , journal={{Computer. Communication}} 33 9 , year={2010} } @incollection{b11, , title={{Building a trust-aware dynamic routing solution for wireless sensor neworks}} , author={{ HDeng } and { YYang } and { GJin } and { RXu } and { WShi }} , booktitle={{Proc. IEEE GLOBECOM Workshop}} IEEE GLOBECOM Workshop , year={Dec-2010} } @incollection{b12, , title={{A survey on trust management for mobile ad hoc networks}} , author={{ JHCho } and { ASwami } and { IRChen }} , journal={{IEEE Commun. Surv. Tuts}} 13 4 , year={2011} , publisher={Fourth Quarter} } @incollection{b13, , title={{Misbehavior detection using implicit trust relations in the AODV routing protocol}} , author={{ MAAyachi } and { CBidan } and { TAbbes } and { ABouhoula }} , booktitle={{International Symposium on Trusted Computing and Communications, Trustcom}} , year={2009} } @incollection{b14, , title={{Distributed combined authentication and intrusion detection with data fusion in high-security mobile ad hoc networks}} , author={{ SBu } and { FRYu } and { PLiu } and { PManson } and { HTang }} , journal={{IEEE Trans. Veh. Technol}} 60 3 , year={Mar. 2011} } @incollection{b15, , title={{A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules}} , author={{ HXia } and { Jiaz } and { LJu } and { XLi } and { YZhu }} , booktitle={{Proc. IEEE/ACM Green Computer Communication}} IEEE/ACM Green Computer Communication , year={2011} } @incollection{b16, , title={{Trustbased fast authentication for multiowner wireless networks}} , author={{ JHassan } and { HSirisena } and { BLandfeldt }} , journal={{IEEE Trans. Mobile Comput}} 7 2 , year={2008} } @incollection{b17, , title={{On trust evaluation in mobile ad hoc networks}} , author={{ QNguyen } and { LLamont } and { PCMason }} , booktitle={{Security and privacy in mobile information and communication systems}} , publisher={Springer} , year={2009} 17 } @incollection{b18, , title={{Trust-based security for wireless ad hoc and sensor networks}} , author={{ ABoukerch } and { LXu } and { KEl-Khatib }} , journal={{Computer Communications}} 30 , year={2007} } @incollection{b19, , title={{Ariadne: A secure on-demand routing protocol for ad hoc networks}} , author={{ Yih-ChunHu } and { AdrianPerrig } and { DavidBJohnson }} , booktitle={{Wireless Networks}} , year={2005} 11 } @incollection{b20, , title={{Trust-based security in pervasive computing environments}} , author={{ LKagal } and { TFinin } and { AJoshi }} , journal={{IEEE Computer}} 34 , year={2001} } @incollection{b21, , title={{Ad hoc On-Demand Distance Vector (AODV) Routing}} , author={{ EPerkins } and { SBelding-Royer } and { Das }} , journal={{IETF RFC}} 3561 , year={Jul. 2003} } @incollection{b22, , title={{Information theoretic framework of trust modeling and evaluation for ad hoc networks}} , author={{ WYSun } and { ZYu } and { KJ RHan } and { Liu }} , journal={{IEEE J. Sel. Areas Commun}} 24 2 , year={Feb. 2006} } @incollection{b23, , title={{Secure routing for mobile ad hoc networks}} , author={{ ZHaas } and { PPapadimitratos }} , booktitle={{Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS)}} the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS) , year={Jan. 2002} } @incollection{b24, , title={{Security-aware ad-hoc routing for wireless networks}} , author={{ SYi } and { PNaldurg } and { RKravets }} , booktitle={{MobiHOC Poster Session}} , year={2001} } @incollection{b25, , title={{SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks}} , author={{ YCHu } and { DBJohnson } and { APerrig }} , booktitle={{Proc. 4th IEEE Workshop Mobile Computing Syst. Applications}} 4th IEEE Workshop Mobile Computing Syst. Applications , year={June 2002} } @incollection{b26, , title={{Authenticated routing for ad hoc networks}} , author={{ KSanzgiri } and { BDahill } and { BNLevine } and { CShields } and { EBeldingroyer }} , journal={{IEEE Journal Selective Areas Communincation}} 2 1 , year={Mar. 2005} } @incollection{b27, , title={{A new secure routing protocol to defend Byzantine attacks for ad hoc networks}} , author={{ MYu } and { SKulkarni } and { PLau }} , booktitle={{Proc. IEEE Int. Conf. Networks (ICON'05)}} IEEE Int. Conf. Networks (ICON'05)Kuala Lumpur, Malaysia , year={Nov. 2005} 2 } @incollection{b28, , title={{Aggregate and verifiably encrypted signatures from bilinear maps}} , author={{ DBoneh } and { CGentry } and { HShacham } and { BLynn }} , booktitle={{Proc. Advances in Cryptology -Eurocrypt-03}} Advances in Cryptology -Eurocrypt-03 , year={2003} }