2016 International Conference on Emerging Technological Trends (ICETT) 2016
DOI: 10.1109/icett.2016.7873711
|View full text |Cite
|
Sign up to set email alerts
|

E-TWRP: Establishing trust worthy reliable path in Mobile Adhoc Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Developer network contrasts packing and travel with numerous current technologies, like OCEAN, LARS, LMRSA, and older DSR systems. For the MANET network, Archana et al [22] employ Secure and Reliable Routing Protocol (SRP) technology, which is an accurate, dependable, and dependable method of ensuring dependable data transfer.A monitoring system has been created by Patel et al [23] to safeguard mountain anonymity. The SHA-1 algorithm is developed to guard against DOS MITM attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Developer network contrasts packing and travel with numerous current technologies, like OCEAN, LARS, LMRSA, and older DSR systems. For the MANET network, Archana et al [22] employ Secure and Reliable Routing Protocol (SRP) technology, which is an accurate, dependable, and dependable method of ensuring dependable data transfer.A monitoring system has been created by Patel et al [23] to safeguard mountain anonymity. The SHA-1 algorithm is developed to guard against DOS MITM attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…For secure data transfer in MANET, Deore Suvarna et al [23] created the Enhanced Adaptive Acknowledgement (EAACK) method. This paper's major goal is to reduce the issue of bad behavior, finite transmission power, and receiver collision.In order to create a secure, legitimate, and reliable routing strategy in MA-NETs to tackle node misbehavior, Anjali Annand et al [24] proposed a distributed dynamic model. Utilize the overhead to assess performance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Authors compared many modern techniques, including LMRSA, LARS, OCEAN, and the conventional DSR methodology suggested a cluster algorithm with a digital signature for secure transmission. Anjali Annand et al [24] suggested a Distributed Dynamic Model in order to make secure, valid and reliable Routing technique in MANETs to handle misbehavior nature of nodes in a network system. Evaluate the performance through overhead.…”
Section: Literature Reviewmentioning
confidence: 99%
“…It is assumed that when two agents have a unit length of one that they are in direct communications range. Any agents on the graph that have a unit length greater than one can communicate using intermediate agents that form part of the path [6]. If an agent becomes disconnected, i.e.…”
Section: Introductionmentioning
confidence: 99%