2015
DOI: 10.1007/s11276-015-1135-5
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preservation and protection for cluster based geographic routing protocol in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
15
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 20 publications
0
15
0
Order By: Relevance
“…We describe the main metrics utilized for network estimation and also further introduce a new noise threshold criteria that is not considered in the prior works (Muthusenthil and Murugavalli, 2017). This helps us to evaluate the correctness of location information based on the direct symmetry test (DST).…”
Section: Metrics Utilized For Estimation In the Networkmentioning
confidence: 99%
“…We describe the main metrics utilized for network estimation and also further introduce a new noise threshold criteria that is not considered in the prior works (Muthusenthil and Murugavalli, 2017). This helps us to evaluate the correctness of location information based on the direct symmetry test (DST).…”
Section: Metrics Utilized For Estimation In the Networkmentioning
confidence: 99%
“…Cluster based routing in MANETs can be differently classified. It may be classified as one hop clustering [25], [29], [30], [40], [45]- [53], multi hop clustering [28], [31], [34]- [36], [39], [42], [43], [54], [55], transmission range or signal strength based clustering [32], [33], [56]- [58] and zone based clustering [38]. MANETs can be classified based on a mobility model such as group mobility [51], [56], [59], [60], regular mobility [46] and random mobility [25], [28], [29], [31], [34], [35], [39], [40], [42], [44], [45], [48], [50], [52], [53], [55], [58], [61]- [64].…”
Section: How To Classify Clustering Schemes?mentioning
confidence: 99%
“…MANETs can be classified based on a mobility model such as group mobility [51], [56], [59], [60], regular mobility [46] and random mobility [25], [28], [29], [31], [34], [35], [39], [40], [42], [44], [45], [48], [50], [52], [53], [55], [58], [61]- [64]. The nature of events that take place in MANETs has a very strong impact on clustering process and the clustering process can be classified into proactive clustering [25], [26], [28], [29], [32], [43], [46], [48], [50], [52]- [55], [58]- [63], [65], reactive clustering [31], [36], [37], [40], [42], [47], [49], [51], [56], [57],…”
Section: How To Classify Clustering Schemes?mentioning
confidence: 99%
“…Some lightweight encryption approaches [28], [29] for IoT are proposed, which can be used for geometric routing. Muthusenthil and Murugavalli [30] proposed a privacy preservation and protection for cluster based geographic routing protocol in MANET using the group signature and encryption. Roos et al [5] proposed anonymous addresses for geometric routing.…”
Section: Related Workmentioning
confidence: 99%