2018 4th International Conference for Convergence in Technology (I2CT) 2018
DOI: 10.1109/i2ct42659.2018.9058022
|View full text |Cite
|
Sign up to set email alerts
|

SQMAA: Security, QoS and Mobility Aware ACO Based Opportunistic Routing Protocol for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…QoS relay nodes look for pathways with enough resources to meet the flow's QoS constraints. Routing protocols that are conscious of QoS should choose routes that are resource-efficient [4]. [5] Looks at certain route selection criteria that are subject to QoS specifications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…QoS relay nodes look for pathways with enough resources to meet the flow's QoS constraints. Routing protocols that are conscious of QoS should choose routes that are resource-efficient [4]. [5] Looks at certain route selection criteria that are subject to QoS specifications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In particular, the feature selection is performed by a PSO algorithm associated with support vector machine and Nave Bayesian in keystrokes dynamic authentication environments for fast user feature detection. To perform security protocols in mobile ad hoc networks (MANET), an ACObased approach is proposed in [160] with the objective of securing communications and authenticating users in MANET in the presence of attacks while ensuring low network latency. The ACO algorithm is able to learn the optimal routing path with data reliability (e.g., authenticated data access) and QoS preservation.…”
Section: Network Authenticationmentioning
confidence: 99%
“…Recently, some data privacy-preserved SI algorithms are also considered for SDN and cloud computing-based 5G networks [158] by forming service migration functions with privacy awareness. Other SI techniques such as ACO [160] also facilitate the 5G network authentication with bio-inspired algorithms embedded at the network controllers, e.g., SDN controllers, for securing communications and authenticating users with QoS preservation. In addition to that, the potential of SI is also reflected in the attack detection tasks thanks to its learning and classification capability [167], such as in the intrusion detection systems of 5G IoT networks.…”
Section: E Summarymentioning
confidence: 99%
See 1 more Smart Citation