[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Vijaya Kumar et al., 2014 - Google Patents

Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning

Vijaya Kumar et al., 2014

View PDF @Full View
Document ID
3363357483829902708
Author
Vijaya Kumar A
Jeyapal A
Publication year
Publication venue
The Scientific World Journal

External Links

Snippet

Mobile ad hoc networks (MANETs) are a collection of mobile nodes with a dynamic topology. MANETs work under scalable conditions for many applications and pose different security challenges. Due to the nomadic nature of nodes, detecting misbehaviour is a …
Continue reading at onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/12Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
    • H04W40/14Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality based on stability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organizing networks, e.g. ad-hoc networks or sensor networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/02Communication route or path selection, e.g. power-based or shortest path routing
    • H04W40/04Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/02Topology update or discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/10Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/48Routing tree calculation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W28/00Network traffic or resource management
    • H04W28/02Traffic management, e.g. flow control or congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W4/00Mobile application services or facilities specially adapted for wireless communication networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W16/00Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic regulation in packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W8/00Network data management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks

Similar Documents

Publication Publication Date Title
Şen et al. Intrusion detection in mobile ad hoc networks
Robinson et al. Energy‐Aware Multipath Routing Scheme Based on Particle Swarm Optimization in Mobile Ad Hoc Networks
Hu et al. Trust based secure and energy efficient routing protocol for wireless sensor networks
Tamil Selvi et al. A novel algorithm for enhancement of energy efficient zone based routing protocol for MANET
Singh et al. Intelligent ad-hoc-on demand multipath distance vector for wormhole attack in clustered WSN
Vijaya Kumar et al. Self‐Adaptive Trust Based ABR Protocol for MANETs Using Q‐Learning
Patil et al. Trust and opportunity based routing framework in wireless sensor network using hybrid optimization algorithm
Khan et al. A Survey on the Noncooperative Environment in Smart Nodes‐Based Ad Hoc Networks: Motivations and Solutions
Tripathy et al. An adaptive secure and efficient routing protocol for mobile ad hoc networks
Menaka et al. Improving performance through reputation based routing protocol for manet
Sharma et al. QSec-RPL: detection of version number attacks in RPL based mobile IoT using Q-learning
Sakthivel et al. A dummy packet-based hybrid security framework for mitigating routing misbehavior in multi-hop wireless networks
Kumar et al. Trust-based fuzzy bat optimization algorithm for attack detection in manet
Thorat et al. Opportunistic routing in presence of selfish nodes for MANET
Wu et al. A dynamic trust model exploiting the time slice in WSNs
Sharma et al. Data dissemination protocol for mobile sink in wireless sensor networks
Mouiz et al. Performance evaluation of OLSR and AODV routing protocols with different parameters in mobile ad-hoc networks using NS2 simulator
Satyanarayana et al. Performance analysis of DSR and cache customized DSR steering protocols in wireless mobile adhoc networks
Sherif et al. Detection and Isolation of Selfish Nodes in MANET Using Collaborative Contact-Based Watchdog with Chimp-AODV
Malhotra et al. A quality of service‐aware routing protocol for FANETs
Malik et al. Analysis of black-hole attack with its mitigation techniques in ad-hoc network
Tiwari et al. A cooperation federated forwarder selection technique for maximizing network lifetime in wireless sensor network
Panigrahi A trust based clustering routing scheme to enhance the security of WSNs
Justus John et al. Energy‐efficient model using optimal route discovery based on adaptive spider monkey optimization model
Jose et al. Security challenges for routing protocols in mobile ad hoc network: a systematic review and open research issues