The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2022
DOI: 10.1002/ett.4717
|View full text |Cite
|
Sign up to set email alerts
|

Enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm

Abstract: In MANET, group key management is a vital part of multicast security. But distribution of keys in an authenticated manner is a difficult task in group key management. The existing methods provide low security with high processing time during group key management resulting does not provide sufficient results. Therefore, enabling security in MANETs using an efficient cluster based group key management with elliptical curve cryptography in consort with sail fish optimization algorithm is proposed in this article … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 29 publications
(61 reference statements)
0
2
0
Order By: Relevance
“…The elliptical curve cryptography based sailfish optimization algorithm (ECC‐SFOA) was established by Shanmuganathan et al 15 to ensure secure communication in MANET through the selection of optimal private key. Prasanth et al 16 elaborated a principal component analysis based on GWO with a deterministic convolutional neural network (PCA‐GWO‐DCNN) for classifying intrusions in the MANET by selecting optimal features with higher fitness values.…”
Section: Related Workmentioning
confidence: 99%
“…The elliptical curve cryptography based sailfish optimization algorithm (ECC‐SFOA) was established by Shanmuganathan et al 15 to ensure secure communication in MANET through the selection of optimal private key. Prasanth et al 16 elaborated a principal component analysis based on GWO with a deterministic convolutional neural network (PCA‐GWO‐DCNN) for classifying intrusions in the MANET by selecting optimal features with higher fitness values.…”
Section: Related Workmentioning
confidence: 99%
“…The snugness of a hub is utilized to depict the trouble of a hub to arrive at different hubs through the organization, and is the backhanded impact of a hub. Characterize it as the proportional of the amount of the separation from this hub to any remaining hubs [15].…”
Section: ░ 4 Deep Learning -Process Estimationmentioning
confidence: 99%