[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Saravanan et al., 2023 - Google Patents

A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET

Saravanan et al., 2023

Document ID
3299134896149082451
Author
Saravanan R
Suresh K
Arumugam S
Publication year
Publication venue
The Journal of Supercomputing

External Links

Snippet

Decentralized mobile ad hoc networks (MANET) is a self-organizing and adaptive method comprised of multiple mobile nodes. Due to the dynamic and flexible nature of network topology, wireless communication links face major issues based on trust and security. The …
Continue reading at link.springer.com (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • H04L67/104Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • H04W4/02Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/12Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Similar Documents

Publication Publication Date Title
Rodrigues et al. Joint trust: An approach for trust-aware routing in WSN
Zungeru et al. Energy efficiency performance improvements for ant‐based routing algorithm in wireless sensor networks
Devi et al. Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer
Saravanan et al. A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET
Behzad et al. An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks
Ahmadi et al. A hybrid algorithm for preserving energy and delay routing in mobile ad-hoc networks
Rabhi et al. IoT routing attacks detection using machine learning algorithms
Bisen et al. An enhanced performance through agent-based secure approach for mobile ad hoc networks
Wu et al. A dynamic trust model exploiting the time slice in WSNs
Sajan et al. An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network
Maratha et al. A comprehensive and systematized review of energy-efficient routing protocols in wireless sensor networks
Kirton et al. Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks
Vijaya Kumar et al. Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning
Altuwairiqi An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS
Mohankumar et al. Network lifetime improved optimal routing in wireless sensor network environment
Keerthana et al. Enhancing the robustness and security against various attacks in a scale: Free network
Vatambeti et al. Black hole attack detection using Dolphin Echo-location-based machine learning model in MANET environment
Lakshmana Kumar et al. A novel approach to improve network validity using various soft computing techniques
Paruvathavardhini et al. Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering
Dong‐liang et al. The importance of nature‐inspired metaheuristic algorithms in the data routing and path finding problem in the internet of things
Al-Mousawi Wireless communication networks and swarm intelligence
Dinesh et al. HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks
Christopher et al. A QoS Aware Three Way Point Rule based Fusion of Earth Worm and Deer Hunt Optimization Routing in Wireless Sensor Network
Dawod et al. A novel nomadic people optimizer-based energy-efficient routing for WBAN
Jyothi et al. New approach to secure cluster heads in wireless sensor networks