2021
DOI: 10.1007/s11277-021-08764-x
|View full text |Cite
|
Sign up to set email alerts
|

EESSMT: An Energy Efficient Hybrid Scheme for Securing Mobile Ad hoc Networks Using IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(23 citation statements)
references
References 37 publications
0
21
0
Order By: Relevance
“…The different existing techniques mainly taken for comparison are FSEE‐ADOV, 13 OEERA, 16 QoS‐AIHCRP, 19 OLSR, 31 and FAES‐AONDVP 14 . A brief description of these techniques is provided below:…”
Section: Resultsmentioning
confidence: 99%
“…The different existing techniques mainly taken for comparison are FSEE‐ADOV, 13 OEERA, 16 QoS‐AIHCRP, 19 OLSR, 31 and FAES‐AONDVP 14 . A brief description of these techniques is provided below:…”
Section: Resultsmentioning
confidence: 99%
“…The proposed scheme offers a higher throughput along with lower end-to-end delay and energy consumption. Furthermore, the rate of success of the proposed scheme is to guarantee and ensure that packet delivery to the destination is very high through multiple paths and in a more secured manner [18]. Vimal et al [19] proposed a hybrid model for mitigating jamming and energy monitoring using the MOACO model along with the double Q-learning model.…”
Section: Iot Monitoring Center Energy Consumption Modelingmentioning
confidence: 99%
“…The max-min ant algorithm used in this article updates the pheromone pair only when the virtual machine-server sequence pair has the minimum value of the objective function value. In Equation (18), FðS best Þ represents the objective function, which is the minimum number of servers that are in a working state after deployment. To avoid stagnation in the search, the value range of the pheromone trace quantity τ ij on each solution element is limited to the ½τ min , τ max interval.…”
Section: Updates On Pheromonesmentioning
confidence: 99%
“…The accessibility of network resources, integrity, confidentiality are dependent upon 92 Computer Science & Information Technology security processes 9 . The MANETs design enables them vulnerable to security attacks 10,11 . Even though several factors contribute to the vulnerability of MANETs, ​​vulnerabilities come through insecure boundaries including compromised nodes 12,13 .…”
Section: Introductionmentioning
confidence: 99%
“…9 The MANETs design enables them vulnerable to security attacks. 10,11 Even though several factors contribute to the vulnerability of MANETs, vulnerabilities come through insecure boundaries including compromised nodes. 12,13 The feasible mode for lessening attacks is prevention measures, not security measures to eliminate attacks, which will necessitate more resources.…”
mentioning
confidence: 99%