2022
DOI: 10.1155/2022/1332373
|View full text |Cite
|
Sign up to set email alerts
|

Implementation of Hidden Node Detection Scheme for Self-Organization of Data Packet

Abstract: The mobile nodes are infrequent movement in nature; therefore, its packet transmission is also infrequent. Packet overload occurred for routing process, and data are lossed by receiver node, since hackers hide the normal routing node. Basically, the hidden node problem is created based on the malicious nodes that are planned to hide the vital relay node in the specific routing path. The packet transmission loss occurred for routing; so, it minimizes the packet delivery ratio and network lifetime. Then, propose… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 28 publications
(17 citation statements)
references
References 19 publications
(17 reference statements)
0
14
0
Order By: Relevance
“…Our proposed approach provides an enhanced Convolutional Neural Network for the classification of the whole scale images. And, finally, our proposed paper compares with the existing approach in the entire image processing system [21][22][23][24][25][26][27][28][29][30][31].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…Our proposed approach provides an enhanced Convolutional Neural Network for the classification of the whole scale images. And, finally, our proposed paper compares with the existing approach in the entire image processing system [21][22][23][24][25][26][27][28][29][30][31].…”
Section: Proposed Methodologymentioning
confidence: 99%
“…e energy consumption, the response time, and the two other parameters are used to explain the QoS methodology of the entire network services [13][14][15][16][17][18][19][20][21][22][23][24][25][26][27].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The multipath routing process must not recover the link failure. This minimizes the network lifetime and detection efficiency and improves the communication overhead [22][23][24][25][26][27][28][29][30][31][32][33][34].…”
Section: Overview Of Proposed Schemementioning
confidence: 99%