Vijaya Kumar et al., 2014 - Google Patents
Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐LearningVijaya Kumar et al., 2014
View PDF- Document ID
- 3363357483829902708
- Author
- Vijaya Kumar A
- Jeyapal A
- Publication year
- Publication venue
- The Scientific World Journal
External Links
Snippet
Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a …
- 238000000034 method 0 abstract description 21
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/12—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
- H04W40/14—Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
- H04W40/246—Connectivity information discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Şen et al. | Intrusion detection in mobile ad hoc networks | |
Robinson et al. | Energy‐Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks | |
Hu et al. | Trust based secure and energy efficient routing protocol for wireless sensor networks | |
Tamil Selvi et al. | A novel algorithm for enhancement of energy efficient zone based routing protocol for MANET | |
Singh et al. | Intelligent ad-hoc-on demand multipath distance vector for wormhole attack in clustered WSN | |
Vijaya Kumar et al. | Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning | |
Patil et al. | Trust and opportunity based routing framework in wireless sensor network using hybrid optimization algorithm | |
Khan et al. | A Survey on the Noncooperative Environment in Smart Nodes‐Based Ad Hoc Networks: Motivations and Solutions | |
Tripathy et al. | An adaptive secure and efficient routing protocol for mobile ad hoc networks | |
Menaka et al. | Improving performance through reputation based routing protocol for manet | |
Sharma et al. | QSec-RPL: detection of version number attacks in RPL based mobile IoT using Q-learning | |
Sakthivel et al. | A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks | |
Kumar et al. | Trust-based fuzzy bat optimization algorithm for attack detection in manet | |
Thorat et al. | Opportunistic routing in presence of selfish nodes for MANET | |
Wu et al. | A dynamic trust model exploiting the time slice in WSNs | |
Sharma et al. | Data dissemination protocol for mobile sink in wireless sensor networks | |
Mouiz et al. | Performance evaluation of OLSR and AODV routing protocols with different parameters in mobile ad-hoc networks using NS2 simulator | |
Satyanarayana et al. | Performance analysis of DSR and cache customized DSR steering protocols in wireless mobile adhoc networks | |
Sherif et al. | Detection and Isolation of Selfish Nodes in MANET Using Collaborative Contact-Based Watchdog with Chimp-AODV | |
Malhotra et al. | A quality of service‐aware routing protocol for FANETs | |
Malik et al. | Analysis of black-hole attack with its mitigation techniques in ad-hoc network | |
Tiwari et al. | A cooperation federated forwarder selection technique for maximizing network lifetime in wireless sensor network | |
Panigrahi | A trust based clustering routing scheme to enhance the security of WSNs | |
Justus John et al. | Energy‐efficient model using optimal route discovery based on adaptive spider monkey optimization model | |
Jose et al. | Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues |