
Z. (2016). Simulation tools for vehicular ad hoc net-
works: A comparison study and future perspectives.
International Conference on Wireless Networks and
Mobile Communications, WINCOM 2015.
Biswas, S. and Morris, R. (2004). Opportunistic routing in
multi-hop wireless networks. ACM SIGCOMM Com-
puter Communication Review, 34:69–74.
Bo, W., Huang, C., Li, L., and Yang, W. (2011). Trust-
based minimum cost opportunistic routing for Ad
hoc networks. Journal of Systems and Software,
84(12):2107–2122.
Boukerche, A. (2009). Algorithms and Protocols for Wire-
less Sensor Networks. Networks, 6:3722–3725.
Chandramouli, R., Sinha, M., Dutta, S., et al. (2018). Rout-
ing protocols and security issues in manet. In Proceed-
ings of the IEEE International Conference on Commu-
nication Systems and Networks (COMSNETS), pages
1–8.
DLR - Institute of Transportation Systems (2015). SUMO
– Simulation of Urban MObility. Institute of Trans-
portation Systems, ” ”(c):55–60.
Elakkiya, M., Kaushik, S., and Edna Elizabeth, N. (2014).
Opportunistic routing to mitigate attacks in MANET.
2014 International Conference on Recent Trends in
Information Technology, ICRTIT 2014.
Huangchuanhe, V. (2010). Trust opportunistic routing pro-
tocol in multi-hop wireless networks. 2010 IEEE In-
ternational Conference on Wireless Communications,
Networking and Information Security, pages 563–567.
Jhanjhi, N., Hossain, M. S., and Yassine, A. (2022). Trust
and mobility-based protocol for secure routing in iot
networks. Sensors, 22(16):6215.
Kamel, M., Alameri, I., and Onaizah, A. (2017). STAODV:
Secure and Trust based Approach to Mitigate Back-
hole Attack on AODV based MANET. IEEE 2nd
Advanced Information Technology, Electronic and Au-
tomation Control Conference (IAEAC), 1:1278–1282.
Kumar, S. and Banerjee, A. (2017). Cryptographic and
trust-based mechanisms in secure routing for manets.
International Journal of Computer Science Issues,
12(3):45–50.
Li, N. and Das, S. K. (2013). A trust-based framework for
data forwarding in opportunistic networks. Ad Hoc
Networks, 11(4):1497–1509.
Luo, H. and Lu, S. (2008). Reputation and Trust-based Sys-
tems for Ad Hoc and Sensor Networks. In A. Bouk-
erche, editor, Algorithms and Protocols for Wireless,
Mobile Ad Hoc Networks, chapter 13, pages 375–405.
Wiley.
Salehi, M. and Boukerche, A. (2014). Trust-aware Op-
portunistic Routing Protocol for Wireless Networks.
ACM, pages 79–86.
Salehi, M. and Boukerche, A. (2015). A Comprehen-
sive Reputation System to Improve the Security of
Opportunistic Routing Protocols in Wireless Net-
works. 2015 IEEE Global Communications Confer-
ence (GLOBECOM), pages 1–6.
Salehi, M., Boukerche, A., Darehshoorzadeh, A., and Mam-
meri, A. (2015). Towards a novel trust-based oppor-
tunistic routing protocol for wireless networks. Wire-
less Networks, 22(3):927–943.
Smriti Jain, N. M. J. K. (2017). A survey on trust based
secure routing in manet. RSIS International Journal of
Research and Scientific Innovation, IV(VIII):59–66.
Thorat, S. A. and Kulkarni, P. J. (2015). Opportunistic
Routing in Presence of Selfish Nodes for MANET.
Wireless Personal Communications, pages 689–708.
Varga, A. and Hornig, R. (2008). AN OVERVIEW OF THE
OMNeT ++ SIMULATION ENVIRONMENT.
Wang, Z., Member, S., Chen, Y., Li, C., and Member, S.
(2012). CORMAN : A Novel Cooperative Oppor-
tunistic Routing Scheme in Mobile Ad Hoc Networks.
30(2):289–296.
Wu, X., Xiao, J., and Shao, J. (2017). Trust-based protocol
for securing routing in opportunistic networks. IEEE
International Conference on Automation Science and
Engineering, 2017-Augus:434–439.
Zhao, Z., Braun, T., Ros
´
ario, D., and Cerqueira, E. (2014a).
CAOR: Context-Aware adaptive opportunistic routing
in mobile ad-hoc networks. 2014 7th IFIP Wireless
and Mobile Networking Conference.
Zhao, Z., Ros
´
ario, D., Braun, T., and Cerqueira, E. (2014b).
Context-aware opportunistic routing in mobile ad-hoc
networks incorporating node mobility. IEEE Wire-
less Communications and Networking Conference,
WCNC, 3:2138–2143.
Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Wenzhong,
Y., and Xi, C. (2013). Efficient Opportunistic Routing
Protocols for VANET. International Journal of Digi-
tal Content Technology and its Applications, 7(8):11–
22.
Zhizhong, J., Chuanhe, H., Liya, X., Bo, W., Xi, C., and
Xiying, F. (2012). A trusted opportunistic routing al-
gorithm for VANET. Proceedings of the International
Conference on Networking and Distributed Comput-
ing, ICNDC, pages 86–90.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
404