2019
DOI: 10.1016/j.csi.2019.103358
|View full text |Cite
|
Sign up to set email alerts
|

Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8
2

Relationship

1
9

Authors

Journals

citations
Cited by 45 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…The approach protects against both indoor and outdoor attackers and measures the presentation by interleaving the attack models. Similarly, in [57], [58] security-aware routing schemes (SARS) are presented. In the first scheme, the authors focused on the cluster-based certificate revocation scheme to isolate the malicious node and prevent the illegal admittance.…”
Section: Comparison Of the Recent Approaches Regarding Manetsmentioning
confidence: 99%
“…The approach protects against both indoor and outdoor attackers and measures the presentation by interleaving the attack models. Similarly, in [57], [58] security-aware routing schemes (SARS) are presented. In the first scheme, the authors focused on the cluster-based certificate revocation scheme to isolate the malicious node and prevent the illegal admittance.…”
Section: Comparison Of the Recent Approaches Regarding Manetsmentioning
confidence: 99%
“…This authorizes attacks that has hashing is not used on the significance to be signed [21]. An improved advancement is to utilize a cryptosystem that is definitely protected below chosen-cipher text attack [22].…”
Section: Figure 1 Wireless Sensor Networkmentioning
confidence: 99%
“…The identical throughputs should be achieved the arithmetic code conversion [16]. The permutation complexity has been divided into the negligible value [17]. SAC-The Secure Arithmetic Coding conversion with the Adaptive Chosen Cipher-text Attacks, the key vectors can recover the permutation step in the model of complexity O(N) where the symbol N is the progression extent [18].…”
Section: Related Workmentioning
confidence: 99%