2018
DOI: 10.1002/cpe.5047
|View full text |Cite
|
Sign up to set email alerts
|

A secured MANET using position‐based opportunistic routing and SEMI MARKOV process

Abstract: Summary Inthe mobile ad hoc network (MANET), the nodes are moving very frequently and they do not have any fixed infrastructure. For reliable data delivery in MANET, we have analyzed the efficiency of data delivery using Position‐based Opportunistic routing method and greedy forwarding technique, which is based on geographic routing method. Initially, the MANET is divided into a number of provinces to identify the location of the receiver, and then Geographic routing is applied on the network for transmission … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The scheme determines the effective path based on energy level but the involvement of attacks is not contemplated, which results in loss of data packets. Proceeding more, Maragatharajan et al [6] recommend a Position-based opportunistic (POR) and greedy routing scheme for reliable data delivery. The work adopts a dual-step process to find the best routing path.…”
Section: Related Workmentioning
confidence: 99%
“…The scheme determines the effective path based on energy level but the involvement of attacks is not contemplated, which results in loss of data packets. Proceeding more, Maragatharajan et al [6] recommend a Position-based opportunistic (POR) and greedy routing scheme for reliable data delivery. The work adopts a dual-step process to find the best routing path.…”
Section: Related Workmentioning
confidence: 99%
“…Data sharing suffers from attacks especially due to having self‐organizing environment of the network infrastructure. Among these attacks, routing attacks have well‐known central focus although they might cause the most destructive damage in MANET . In Reference , encryption is applied on the data by using the symmetric cryptographic technique, which uses same key for encryption and decryption.…”
Section: Introductionmentioning
confidence: 99%