2017
DOI: 10.18576/amis/110321
|View full text |Cite
|
Sign up to set email alerts
|

Proficient and Secured Routing in MANET Based on Trust and Energy Supported AODV

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…Singh et al [17] developed the Secure Optimized Link State Routing Protocol, which produced the link and message without relying on a third party but did not provide for attack detection. Sridhar et al [18] employ the POR Algorithm to change the network capacity; nonetheless, the research fails due to poor network performance The TESAODV approach reduced network lifetime in the study however the research failed to maintain energy levels. Rao and Singh [3]used the KF-MAC approaches to obtain QOS parameters, but the findings yielded maximum delays.…”
Section: Based On Topology Managementmentioning
confidence: 91%
See 1 more Smart Citation
“…Singh et al [17] developed the Secure Optimized Link State Routing Protocol, which produced the link and message without relying on a third party but did not provide for attack detection. Sridhar et al [18] employ the POR Algorithm to change the network capacity; nonetheless, the research fails due to poor network performance The TESAODV approach reduced network lifetime in the study however the research failed to maintain energy levels. Rao and Singh [3]used the KF-MAC approaches to obtain QOS parameters, but the findings yielded maximum delays.…”
Section: Based On Topology Managementmentioning
confidence: 91%
“…Finally Sridhar et al [18], Rao and Singh [3], Musthafa et al [19], Jim et al [22], Abirami and Sumithra [21], Ponnusamy [23], Rahmani et al [16], Singh et al [17], Ramesh et al [24], Hasani et al [25], Nobahary and Babaie [8], Hadi et al [27], Kumar et al [28], Venkatesh and Chakravarthi [29], Raj Kumar and Bala [31], Sahu and Patil [43], Al-Najjar [32], Devika and Sudha [33], Braik et al [35], Saravanan et al [39], Bisen et al [40], Arulprakash et al [41], Sivapriya and Mohandas [38] achieves only one parameters are fails to other parametersby using the methods TESAODV, KF-MAC, SNDA, AIS, NCV-AODV, EE, AUTOMATA, OLSR, MSD-SNDT, FSN, SNMN, SNAODV, QOS, CHLD, EECAO, ACO, CLU, C-SEWO, AGS-ROA, E-CFSA, E-√ √ √ √…”
Section: Performance Comparison Of Manet With Existing Methodsmentioning
confidence: 96%
“…To calculate the reply, transmission, and request rate of the node by intermediate values such as RQi, RPi and DTi. It's mathematically written as given below [43], Fig. 1 shows the overview of the proposed EESRP method.…”
Section: Trust Managementmentioning
confidence: 99%