2014
DOI: 10.3233/jhs-140494
|View full text |Cite
|
Sign up to set email alerts
|

An efficient and dependable protocol for critical MANETs

Abstract: Critical MANET environments such as military battlefields and disaster recovery operations impose a number of requirements such as the need for robustness and performance within high mobility scenarios; also, they impose some constraints such as Hostile attacks, RF range and cost, battery limitations.We studied the core-based routing protocol PUMA, in addition to two ant-based routing protocols MANHSI and AAMRP to identify their drawbacks while working in critical MANETs. Finally, we propose a novel routing pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…A recommendation subsystem based on the Wilson score confidence interval was introduced for the purpose of enabling the system to recognize malicious users. Two fundamental parameters (trust value and reputation value) were used in [10]. The nodes with highest trust values are used to build the headship induction table and the high value of reputation of a node signifies that the node is trusted and is more reliable for data communication purposes.…”
Section: Trust Models In Manetsmentioning
confidence: 99%
See 1 more Smart Citation
“…A recommendation subsystem based on the Wilson score confidence interval was introduced for the purpose of enabling the system to recognize malicious users. Two fundamental parameters (trust value and reputation value) were used in [10]. The nodes with highest trust values are used to build the headship induction table and the high value of reputation of a node signifies that the node is trusted and is more reliable for data communication purposes.…”
Section: Trust Models In Manetsmentioning
confidence: 99%
“…Furthermore, the authors proposed a new routing framework in a MANET based on a sophisticated trust model. The authors proposed a new mechanism termed as ASHFIK [10], which was used to make the routing protocol capable to maintain the group communications. In this mechanism, a new trusted core node is always ready to replace the original core node when it goes down.…”
Section: Trust-based Routing Protocols In Manetsmentioning
confidence: 99%
“…The superiority of service provisioning methods are divided into two groups: inflexible superiority of service and flexible superiority of service methods. Whether superiority of service needs of a link connectivity is assured for the entire process time, the superiority of service method is expressed as inflexible superiority of service method [8].…”
Section: Introductionmentioning
confidence: 99%