2018
DOI: 10.1016/j.aej.2016.10.004
|View full text |Cite
|
Sign up to set email alerts
|

Robust against route failure using power proficient reliable routing in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 1 publication
0
12
0
Order By: Relevance
“…Routing methods can be characterized into three types: Proactive, Reactive routing method and Hybrid methods. The routing methods in MANET are practiced to deal with significantly number of nodes with limited resources [5]. The real worry in routing method is entering/leaving of the nodes in network [6].…”
Section: Routing Protocol Typesmentioning
confidence: 99%
See 1 more Smart Citation
“…Routing methods can be characterized into three types: Proactive, Reactive routing method and Hybrid methods. The routing methods in MANET are practiced to deal with significantly number of nodes with limited resources [5]. The real worry in routing method is entering/leaving of the nodes in network [6].…”
Section: Routing Protocol Typesmentioning
confidence: 99%
“…Malathi et al [5] proposed group based security design for Ad hoc systems. They proposed and unsurprising security idea dependent on a disseminated confirmation.…”
Section: Literature Surveymentioning
confidence: 99%
“…Proficient Reliable Routing Protocol [1] was proposed for communication in MANET to reduce the failure of route while data transmission in progress. It utilizes 3 steps to find the reliable route for transmission, which are channel quality, link quality, and energy available.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In a routing process, neighbor node's trust is evaluated by the sender by observing activities carried out by that neighbor and forwarding behaviors of neighbors. To be specific, a source node will observe the trust of its neighbor node based on its data forwarding behaviors and QoS parameters [5]. In our proposed trust-based model, we calculate historical trust consistently after a particular time interim called trust update so that we can identify all the nodes that behave maliciously and then update secure routes towards destinations by …”
Section: Trust Updatementioning
confidence: 99%
“…MANETs can be deployed quickly and easily, making them very suitable for applications such as environmental monitoring, military surveillance, disaster rescue, etc. [4,5].…”
Section: Introductionmentioning
confidence: 99%