2022
DOI: 10.1016/j.compeleceng.2022.107902
|View full text |Cite
|
Sign up to set email alerts
|

Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…A similar problem is faced by Gomathy et al 9 and Pon et al 31 because that is also a cluster‐based scheme. In Reference 32, a trust‐based probabilistic malicious node detection method is proposed where a periodically accessible trusted authority has to be deployed to pass judgment on the behavior of suspicious nodes based on gathered routing evidence with self and coordinate monitoring. Authors claim that it improves network throughput by 34% compared to previous methodologies.…”
Section: Related Workmentioning
confidence: 99%
“…A similar problem is faced by Gomathy et al 9 and Pon et al 31 because that is also a cluster‐based scheme. In Reference 32, a trust‐based probabilistic malicious node detection method is proposed where a periodically accessible trusted authority has to be deployed to pass judgment on the behavior of suspicious nodes based on gathered routing evidence with self and coordinate monitoring. Authors claim that it improves network throughput by 34% compared to previous methodologies.…”
Section: Related Workmentioning
confidence: 99%
“…Security is always a important factor in MANET due to frequent connection interruptions, bandwidth, resource constraint and high mobility of the wireless nodes. The nodes may behave selfishly and maliciously due to the energy constraints in forwarding other nodes' packets as they have to use their energy (1)(2)(3)(4) . Many conventional cryptography-based approaches are in existence to resolve security issues in MANET but these approaches are inefficient in isolating the untrustworthy nodes.…”
Section: Introductionmentioning
confidence: 99%