Saravanan et al., 2023 - Google Patents
A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANETSaravanan et al., 2023
- Document ID
- 3299134896149082451
- Author
- Saravanan R
- Suresh K
- Arumugam S
- Publication year
- Publication venue
- The Journal of Supercomputing
External Links
Snippet
Decentralized mobile ad hoc networks (MANET) is a self-organizing and adaptive method comprised of multiple mobile nodes. Due to the dynamic and flexible nature of network topology, wireless communication links face major issues based on trust and security. The …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rodrigues et al. | Joint trust: An approach for trust-aware routing in WSN | |
Zungeru et al. | Energy efficiency performance improvements for ant‐based routing algorithm in wireless sensor networks | |
Devi et al. | Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer | |
Saravanan et al. | A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET | |
Behzad et al. | An artificial immune based approach for detection and isolation misbehavior attacks in wireless networks | |
Ahmadi et al. | A hybrid algorithm for preserving energy and delay routing in mobile ad-hoc networks | |
Rabhi et al. | IoT routing attacks detection using machine learning algorithms | |
Bisen et al. | An enhanced performance through agent-based secure approach for mobile ad hoc networks | |
Wu et al. | A dynamic trust model exploiting the time slice in WSNs | |
Sajan et al. | An energy aware secure three-level weighted trust evaluation and grey wolf optimization based routing in wireless ad hoc sensor network | |
Maratha et al. | A comprehensive and systematized review of energy-efficient routing protocols in wireless sensor networks | |
Kirton et al. | Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks | |
Vijaya Kumar et al. | Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning | |
Altuwairiqi | An optimized multi-hop routing protocol for wireless sensor network using improved honey badger optimization algorithm for efficient and secure QoS | |
Mohankumar et al. | Network lifetime improved optimal routing in wireless sensor network environment | |
Keerthana et al. | Enhancing the robustness and security against various attacks in a scale: Free network | |
Vatambeti et al. | Black hole attack detection using Dolphin Echo-location-based machine learning model in MANET environment | |
Lakshmana Kumar et al. | A novel approach to improve network validity using various soft computing techniques | |
Paruvathavardhini et al. | Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering | |
Dong‐liang et al. | The importance of nature‐inspired metaheuristic algorithms in the data routing and path finding problem in the internet of things | |
Al-Mousawi | Wireless communication networks and swarm intelligence | |
Dinesh et al. | HBO-SROA: Honey Badger optimization based clustering with secured remora optimization based routing algorithm in wireless sensor networks | |
Christopher et al. | A QoS Aware Three Way Point Rule based Fusion of Earth Worm and Deer Hunt Optimization Routing in Wireless Sensor Network | |
Dawod et al. | A novel nomadic people optimizer-based energy-efficient routing for WBAN | |
Jyothi et al. | New approach to secure cluster heads in wireless sensor networks |