2018
DOI: 10.1016/j.compeleceng.2017.11.031
|View full text |Cite
|
Sign up to set email alerts
|

Secured energy optimized Ad hoc on-demand distance vector routing protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 2 publications
0
7
0
Order By: Relevance
“…Third Phase, where all nodes that reach this phase will be examined by their packet delivery ratio (PDR). The nodes that are in the suspicious list will be checked by PDR detection and compare their PDR with the threshold value that is calculated using K-Means clustering algorithm as illustrated in (3). The algorithm processes the input one at a time and tries all possible values of the PDR from 0-1, maintaining these results in their hidden units that implicitly contains information about the history of all the past PDR results.…”
Section: In-band Wormhole Detection 1) Round Trip Time (Rtt) Phasementioning
confidence: 99%
See 1 more Smart Citation
“…Third Phase, where all nodes that reach this phase will be examined by their packet delivery ratio (PDR). The nodes that are in the suspicious list will be checked by PDR detection and compare their PDR with the threshold value that is calculated using K-Means clustering algorithm as illustrated in (3). The algorithm processes the input one at a time and tries all possible values of the PDR from 0-1, maintaining these results in their hidden units that implicitly contains information about the history of all the past PDR results.…”
Section: In-band Wormhole Detection 1) Round Trip Time (Rtt) Phasementioning
confidence: 99%
“…MANET is an unreliable, open medium, self-configured wireless networks and the process of dynamic device communication where the participating node can enter or leave is simplified. This leads to changing network topology rapidly and unpredictably [3]. Routing protocols play an important role in wireless network to route the packet over multiple hops and from one node to another, it is the backbone of wireless networks and have ability to show the shortest The associate editor coordinating the review of this manuscript and approving it for publication was Dongxiao Yu .…”
Section: Introductionmentioning
confidence: 99%
“…In this circumstance, MN1 -sender, MN17 -receiver, tthe distance between MN1 and MN17. (MN8) and (MN9) is the rushing attack route and the actual route of the routing protocols communication, index sender to receiver [7] [22] [23]. It is referred to the MN1 -sender, index MN8 to the receiver MN8, R1 is the general rushing route, R1MN1→ MN2→ MN5→ MN10→ MN9 is the total amount of nodes directivity between MN1-sender, MN17 -receiver, without (R1, MN1) and (R1, MN17) is 5.…”
Section: Proposed Routing Protocols Communication For Rushing Attacker Detectionmentioning
confidence: 99%
“…In addition, MANETs are self-configured networks and the message forwarding is dynamic since the nodes in this network can enter and leave the network at any time. Therefore, the network topology is rapidly changing leading to unpredictability [7]. Basically, MANETs and WSNs offer communication standards for a myriad of applications via mobility and enhanced usage of resource-constrained [8] devices.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, new applications that require high computation power and large memory capacity [38] have been noted to be detrimental. According to [39] and [7] the broadcast nature of MANET networks can lead to security exposures. In addition, the physical open channel [40] utilized in MANET and WSN communication is intrinsically insecure.…”
Section: Introductionmentioning
confidence: 99%