2020
DOI: 10.11591/ijece.v10i2.pp1592-1598
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based secure routing against lethal behavior of nodes in wireless adhoc network

Abstract: Offering a secure communication in wireless adhoc network is yet an open-end problem irrespective of archives of existing literatures towards security enhancement. Inclination towards solving specific forms of attack in adhoc network is majorly seen as an existing trend which lowers the applicability of existing security solution while application environment or attack scenario is changed. Therefore, the proposed system implements an analytical secure routing modeling which performs consistent monitoring of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…To achieve integration between these networks, investigations were carried out with the aim of achieving computer security mechanisms in the refinery, where various protection options applied in refineries worldwide were analyzed. Among these options, there are works where the use of DMZ networks is proposed and others where the use of firewalls is proposed [3,7,8,11]. The need to subdivide the refinery networks into three networks was also taken into account: two external networks (Internet and business) and an internal network (industrial or control, with data and process variables).…”
Section: Design Methodology Of a Dmz Using Firewallsmentioning
confidence: 99%
See 1 more Smart Citation
“…To achieve integration between these networks, investigations were carried out with the aim of achieving computer security mechanisms in the refinery, where various protection options applied in refineries worldwide were analyzed. Among these options, there are works where the use of DMZ networks is proposed and others where the use of firewalls is proposed [3,7,8,11]. The need to subdivide the refinery networks into three networks was also taken into account: two external networks (Internet and business) and an internal network (industrial or control, with data and process variables).…”
Section: Design Methodology Of a Dmz Using Firewallsmentioning
confidence: 99%
“…The industrial network, since 2007, has a SIEMENS PCS7 distributed control system, based on the use of field buses, Profibus PA and Profibus DP communication networks, ET 200 communication cards, as well as a wide range of field equipment and instrumentation capable of providing process data. This network is supported on a bank of redundant servers in real-time [11].…”
Section: Introductionmentioning
confidence: 99%