2021
DOI: 10.1007/s10586-021-03473-3
|View full text |Cite
|
Sign up to set email alerts
|

An intelligent trust sensing scheme with metaheuristic based secure routing protocol for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 21 publications
(21 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…At each simulation, we have considered different source and destination nodes and after receiving the data at destination node, we measured the performance through different metrics. Further, to check the efficiency of proposed approach, we compared it with several existing methods such as TRM-IOT [9], OSEAP-IOT [10], MCTAR-IOT [15] and CBBMOR-TSM-IOT [16]. The observations are shown in the following figures.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…At each simulation, we have considered different source and destination nodes and after receiving the data at destination node, we measured the performance through different metrics. Further, to check the efficiency of proposed approach, we compared it with several existing methods such as TRM-IOT [9], OSEAP-IOT [10], MCTAR-IOT [15] and CBBMOR-TSM-IOT [16]. The observations are shown in the following figures.…”
Section: Resultsmentioning
confidence: 99%
“…In such situation, the selection of Metaheuristic algorithm becomes complex. Hence, we conduct a simulation study through different Metaheuristic algorithms including "particle swarm optimization (PSO)" [26], "gravitational search optimization (GSA)" [27], "whale optimization algorithm (WOA)" [28], "chaotic bumble bee mating optimization (CBBMO)" [16] and "firefly algorithm (FFA)". Among these algorithms, we found the better performance at FFA which ensured a less delay than the remaining algorithms.…”
Section: Resultsmentioning
confidence: 99%
“…CMTL transcends LE and moral education, thus generating a new whole. This new thing transcends the essence of the original LE and moral education, breaks the situation that LE and moral education work independently 10 . CMTL is not only derived from LE and moral education, but also higher than LE and moral education.…”
Section: Characteristics Of Cmtlmentioning
confidence: 93%
“…The author in [ 22 ] addressed an intelligent opportunistic routing algorithm for wireless sensor networks and applies it for e-healthcare. The author in [ 23 ] presented an intelligent trust sensing scheme with metaheuristic-based secure routing protocol for Internet of Things in [ 23 ], to identify the next hope by using a fitness function. However, it cannot avoid the attacker directly in order to select the next hope.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…The author in [ 25 ] studied a trust-based secure intelligent opportunistic routing protocol to avoid the gray and black-hole attack in the wireless sensor networks. However, these works [ 22 , 23 , 24 , 25 ] proposed secure routing that did not focus on sinkhole attack in VANET. The authors in [ 26 ] addressed the method of speed adaptive beacon broadcast (SABB) to propagate information in urban and highway environments.…”
Section: Related Work and Motivationsmentioning
confidence: 99%