2023
DOI: 10.32604/csse.2023.029345
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET

Abstract: A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network (MANET). A MANET's nodes could engage actively and dynamically with one another. However, MAN-ETs, from the other side, are exposed to severe potential threats that are difficult to counter with present security methods. As a result, several safe communication protocols designed to enhance the secure interaction among MANET nodes. In this research, we offer a reputed optimal routing value a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 46 publications
(50 reference statements)
0
3
0
Order By: Relevance
“…Table 3 presents the simulation parameters in this study. The existing algorithms such as ETRS [17], HTRM [20], and DNLPPR-WMNDI [23] are also simulated using these parameters to compare their performance with the proposed algorithm. The evaluation metrics include PDR, PLR, energy consumption, throughput, and E2E delay.…”
Section: Simulation Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 3 presents the simulation parameters in this study. The existing algorithms such as ETRS [17], HTRM [20], and DNLPPR-WMNDI [23] are also simulated using these parameters to compare their performance with the proposed algorithm. The evaluation metrics include PDR, PLR, energy consumption, throughput, and E2E delay.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…However, it had low PDR and high PLR when the number of nodes was increased. In [20], the HTRM was developed to find the besttrusted path and detect misbehaving nodes based on trust values. However, the throughput and energy consumption values were not effective in detecting collaborative attacks.…”
Section: Literature Surveymentioning
confidence: 99%
“…Furthermore, the use of the adaptive parameter tuning technique and the global best selection strategy helps to avoid premature convergence, and ensures that the algorithm continues to explore the search space for better solutions [32]. By dynamically adjusting the parameters of the algorithm based on the performance of the swarm, the algorithm is able to adapt to different types of optimization problems and search spaces, and achieve better results.…”
Section: Update Personal and Global Best Positionsmentioning
confidence: 99%