2020
DOI: 10.1002/dac.4252
|View full text |Cite
|
Sign up to set email alerts
|

E‐TDGO: An encrypted trust‐based dolphin glowworm optimization for secure routing in mobile ad hoc network

Abstract: Mobile ad hoc networks (MANETs) are independent networks, where mobile nodes communicate with other nodes through wireless links by multihop transmission. Security is still an issue to be fixed in MANETs. Hence, a routing protocol named encrypted trust-based dolphin glowworm optimization (DGO) (E-TDGO) is designed using Advanced Encryption and trust-based optimization model for secure routing in MANET. The proposed E-TDGO protocol includes three phases, namely, k-path discovery, optimal path selection, and co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(9 citation statements)
references
References 48 publications
0
9
0
Order By: Relevance
“…This "Use Best Approximation" predicts the efficient route in an optimized manner. "Swift Implicit Response Round Trip Time" also supports managing global optimization [34]. The combination of the "Use Best Approximation" and "Swift Implicit Response Round Trip Time" mechanism produces the Modified AODV and Hybrid Random Late Detection (HRLD) for route finding, time confine against the attacks like (Rushing attacks, Sybil attacks).…”
Section: Figure 2 Activities Of Attacker Detection Automation Of Beesmentioning
confidence: 99%
See 2 more Smart Citations
“…This "Use Best Approximation" predicts the efficient route in an optimized manner. "Swift Implicit Response Round Trip Time" also supports managing global optimization [34]. The combination of the "Use Best Approximation" and "Swift Implicit Response Round Trip Time" mechanism produces the Modified AODV and Hybrid Random Late Detection (HRLD) for route finding, time confine against the attacks like (Rushing attacks, Sybil attacks).…”
Section: Figure 2 Activities Of Attacker Detection Automation Of Beesmentioning
confidence: 99%
“…This research defines the Hybrid Random Late Detection (HRLD) routing protocol by the following two assumptions. An HRLD routing protocol is mainly proposed for path optimization on the MANET [33] [34].…”
Section: Hybrid Random Late Detection (Hrld) Routing Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Mukhedkar MM and Kolekar U (2020) designed the routing protocol called Encrypted trust-based dolphin glow-worm optimization (DGO) (E-TDGO) for providing secure routing in MANET. The experimental results were demonstrated with the measures such as packet drop, delay, detection rate, and throughput with considering the attacks [14].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Mukhedkar and Kolekar [39] addressed the security issue in MANETs and proposed a secure routing protocol encrypted trust-based dolphin glowworm optimization (E-TDGO). This protocol provides security to three phases (i.e., route discovery, optimal path selection, and communication through the selected route) using a trust-based optimization model and advanced encryption standard-128 (AES-128).…”
Section: Wireless Communications and Mobile Computingmentioning
confidence: 99%