2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications 2008
DOI: 10.1109/wimob.2008.61
|View full text |Cite
|
Sign up to set email alerts
|

QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 16 publications
0
9
0
Order By: Relevance
“…Once the basic setup of the network is done; the source and the destination are randomly selected within the network. The Algorithm 4 comprises the establishment of the path (Dhurandher et al, 2008) Algorithm 4 Path establishment…”
Section: Route Discovery and Trust Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Once the basic setup of the network is done; the source and the destination are randomly selected within the network. The Algorithm 4 comprises the establishment of the path (Dhurandher et al, 2008) Algorithm 4 Path establishment…”
Section: Route Discovery and Trust Modelmentioning
confidence: 99%
“…As it is a supervised learning technique, the trained specimen itself is taken as the test specimen. Its simulation outcome renders the accurate intruder and then later it is prevented from the processing (Dhurandher et al, 2008).…”
Section: Step4mentioning
confidence: 99%
“…Hence, each sensor is equipped with wireless communication capability, and signal processing and networking abilities. The main functions of any WSN are sensing, communication, and computing [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. One scheme to categorize wireless sensor networks is based on whether the nodes are separately addressable, and another is based on whether the data in the network are aggregated.…”
Section: Characteristics Of Wireless Sensor Networkmentioning
confidence: 99%
“…MEMO technology integrates mechanical elements, sensors, actuators, and electronics on a common silicon substrate through microfabrication technology, whereas the electronics are fabricated by using integrated circuit (IC) process sequences such as bipolar, CMOS transistors. The micromechanical elements are made up using well-suited micromachining techniques that purposely add new structural layers to create the mechanical and electromechanical devices [1][2][3][4][5][6][7][8][9][10][11][12][13][14].…”
mentioning
confidence: 99%
“…The nodes with highest trust values are used to build the headship induction table and the high value of reputation of a node signifies that the node is trusted and is more reliable for data communication purposes. As a node shows signs of misbehavior, its reputation decreases, which affect its quality-of-security (QSec), thereby disabling the malicious nodes from gaining access to the network [7].…”
Section: Headship Induction Table Using Aco With Trust and Reputationmentioning
confidence: 99%