2015 International Symposium on Advanced Computing and Communication (ISACC) 2015
DOI: 10.1109/isacc.2015.7377359
|View full text |Cite
|
Sign up to set email alerts
|

Trusted and secured routing in MANET: An improved approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…where H indicates whether the node has the capability of harvesting energy, as shown in Equation (6). H = 0, next node without harvesting 1, next node with harvesting…”
Section: Su-gpsrmentioning
confidence: 99%
See 1 more Smart Citation
“…where H indicates whether the node has the capability of harvesting energy, as shown in Equation (6). H = 0, next node without harvesting 1, next node with harvesting…”
Section: Su-gpsrmentioning
confidence: 99%
“…Mobile ad-hoc networks complete the information transmission with multiple hops. With the rapid development of computing, sensor, communication and network technology, mobile ad-hoc networks will play a new role in military and civilian applications, such as search and rescue operations, target detection, prevention of attacks, wind speed estimation, etc [4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%
“…The stability of the network in the literature is presented in different viewpoints by different researchers [1,2,10,[12][13][14]. These define the network traffic dimension associated with traditional communication networks and the survival concept of the network based on services, all of which are the primary concern for network reliability and node resilience [15].…”
Section: Related Workmentioning
confidence: 99%
“…Several studies on the prediction of node behavior in literature have been discussed in [2,5,6,12]. Thus, malfunctions and multiple failures of wireless nodes are encouraging new challenges to the survival of ad hoc networks and releasing results and its effect.…”
Section: Role Of Node Behavior For Trust Changesmentioning
confidence: 99%
See 1 more Smart Citation