Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 6 publications
0
8
0
Order By: Relevance
“…Though diverse range of schemes have been proposed for the well-checked utilization of trust recommendations, which can be classified into weighted averaging based schemes e.g. [18][19][20][21][22], personal experience based schemes e.g. [23][24][25][26][27][28] and majority rule based schemes e.g.…”
Section: Figure 1 Acquiring Trust Recommendations In Trustmentioning
confidence: 99%
See 1 more Smart Citation
“…Though diverse range of schemes have been proposed for the well-checked utilization of trust recommendations, which can be classified into weighted averaging based schemes e.g. [18][19][20][21][22], personal experience based schemes e.g. [23][24][25][26][27][28] and majority rule based schemes e.g.…”
Section: Figure 1 Acquiring Trust Recommendations In Trustmentioning
confidence: 99%
“…Utilization of trust recommendations and dealing with dishonest trust recommendations in trust management systems in MANETs is an open and challenging issue and it has attracted the efforts of many researchers in recent era. Different schemes have been proposed for treating dishonest trust recommendations and computing of indirect trust from trust recommendations in trust management system in MANETs [18][19][20][21][22][23][24][25][26][27][28][29][30][31]. These schemes can be classified into three categories: (a) weighted averaging based schemes [18][19][20][21][22], (b) personal experience based schemes [23][24][25][26][27][28] and (c) majority rule based schemes [29][30][31] [37].…”
Section: Related Workmentioning
confidence: 99%
“…Therefore, researchers have developed security incorporated routing protocols that support security routing. [15] Aravindh et.al., [17] proposed Trust and Energy aware Routing Protocol (TERP) to balance energy consumption of the network and trustworthiness of the nodes, in an effective manner. TERP identifies and discards bad nodes so as to provide security whereas the energy aware characteristic of the protocol distributes the network load with the prior knowledge of the energy available with the nodes.…”
Section: Literature Surveymentioning
confidence: 99%
“…As the enduring energy of each one-hop node is considered for effective neighbor selection which avoids indirect trust and path trust to prevent unnecessary update. The direct trust between CH and GW ( ) is computed by MN [15] [18] using equation 6Where, is the packets transmitted from Cluster Head and is the count of packets received by gateway node.…”
Section: Path Trust (Pt)mentioning
confidence: 99%
See 1 more Smart Citation