2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) 2018
DOI: 10.1109/iccubea.2018.8697864
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Performance of Anonymity Based Secure Routing Protocol Utilizing Cross Layer Design for Mobile Adhoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…21 An IP-based approach is presented to perform threat detection according to the list of IP addresses and route addresses which are blacklisted. 22 A anonymity orient routing algorithm with more security is presented in Bhusari, 23 which uses delay and control overhead in identifying the secure route. In Wadhwani 24 and Maragatharajan and Balakannan, 25 the author analzes various routing protocols, namely, SAR, SEAD, and ARAN at different underlying security mechanism, scalability, overhead, etc.…”
Section: Related Workmentioning
confidence: 99%
“…21 An IP-based approach is presented to perform threat detection according to the list of IP addresses and route addresses which are blacklisted. 22 A anonymity orient routing algorithm with more security is presented in Bhusari, 23 which uses delay and control overhead in identifying the secure route. In Wadhwani 24 and Maragatharajan and Balakannan, 25 the author analzes various routing protocols, namely, SAR, SEAD, and ARAN at different underlying security mechanism, scalability, overhead, etc.…”
Section: Related Workmentioning
confidence: 99%
“…In [22] introduced secure cross layer routing protocol for MANET analyzing the performance. The creator of [23,24] inspects various guiding shows concerning major security frameworks, adaptability, above, and different elements, including SAR, SEAD, ARAN, and others. In MANET [25], which utilizes both physical and legitimate trust, the trusts of different hubs were used for coordinating.…”
Section: Literature Surveymentioning
confidence: 99%
“…The number of the sent packets depends on the available bandwidth. In [12], a secured and optimized routing protocol for MANET is proposed by A. Bhusari et al This work was designed to optimize the performance of the routing protocol by minimizing the overhead and the delay. To secure this proposed protocol, a new metric based on cross layer design is provided to defend several attacks.…”
Section: Related Workmentioning
confidence: 99%