2016 International Conference on Emerging Trends in Engineering, Technology and Science (ICETETS) 2016
DOI: 10.1109/icetets.2016.7602991
|View full text |Cite
|
Sign up to set email alerts
|

A hybrid secure routing scheme for MANETS

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…Majority of the challenges are either associated with data forwarding / traffic related operation while other forms of problems are related to security problems in wireless adhoc network [2][3][4][5]. At present, there are many security schemes evolved toward secure applications of wireless adhoc network [6][7][8][9][10], but very few approach towards safeguarding the generalized architecture of wireless adhoc network. It is because the applications of the wireless adhoc network are very much different from each other in communication protocol perspective, therefore, the applicability of security solution of one application is never applicable to solve same security problem in another application.…”
Section: Introductionmentioning
confidence: 99%
“…Majority of the challenges are either associated with data forwarding / traffic related operation while other forms of problems are related to security problems in wireless adhoc network [2][3][4][5]. At present, there are many security schemes evolved toward secure applications of wireless adhoc network [6][7][8][9][10], but very few approach towards safeguarding the generalized architecture of wireless adhoc network. It is because the applications of the wireless adhoc network are very much different from each other in communication protocol perspective, therefore, the applicability of security solution of one application is never applicable to solve same security problem in another application.…”
Section: Introductionmentioning
confidence: 99%
“…4957 forms of problems are related to security problems in the ad-hoc wireless network [8][9][10][11]. At present, there are many security schemes evolved toward security applications of the ad-hoc wireless network [12][13][14][15][16], but very few approaches towards safeguarding the generalized architecture of the ad-hoc wireless network. It is because there are different types of applications in an ad-hoc wireless network with respect to the perspective of a communication protocol; therefore, the applicability of security solution of one application is never applicable to solve the same security problem in another application.…”
Section: Introductionmentioning
confidence: 99%
“…First, determine the optimal routing path and then transfer the information packets through the network. Routing protocols use several metrics to calculate the best path for routing the packet to its destination [4][5][6]. These metrics are a standard measurement that could be, for example, number of hops, which is used by a routing algorithm to determine the optimal path for the packet to its destination.…”
Section: Introductionmentioning
confidence: 99%