2017
DOI: 10.1016/j.jksuci.2016.03.004
|View full text |Cite
|
Sign up to set email alerts
|

F3TM: Flooding Factor based Trust Management Framework for secure data transmission in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(23 citation statements)
references
References 7 publications
0
22
0
Order By: Relevance
“…Be that as it may, because of its transparency and absence of brought together administrations, giving a protected domain is as yet a difficult undertaking for a portable networks. It is difficult to accomplish classification and credibility in such system [13].…”
Section: Figure 1 Routing Protocolsmentioning
confidence: 99%
“…Be that as it may, because of its transparency and absence of brought together administrations, giving a protected domain is as yet a difficult undertaking for a portable networks. It is difficult to accomplish classification and credibility in such system [13].…”
Section: Figure 1 Routing Protocolsmentioning
confidence: 99%
“…ACO and AODV for Energy c. Average Delay Delay means to cause to be late during data transmission. Network delay is an important design and performance characteristics of a network [10]. The delay in network specifies how long it takes for a data to travel across the network from one node to another node.…”
Section: B Energymentioning
confidence: 99%
“…Ahmed et al presented an algorithm in which calculated trust values are used to identify malicious nodes [18]. True flooding approach was utilized to identify attacking nodes based on trust values.…”
Section: Related Workmentioning
confidence: 99%