作者
P Ganesh, GBSR Naidu, Korla Swaroopa, R Rahul, Ahmad Almadhor, C Senthilkumar, Durgaprasad Gangodkar, A Rajaram, Alazar Yeshitla
发表日期
2022
期刊
Wireless Communications and Mobile Computing
卷号
2022
期号
1
页码范围
1332373
出版商
Hindawi
简介
The mobile nodes are infrequent movement in nature; therefore, its packet transmission is also infrequent. Packet overload occurred for routing process, and data are lossed by receiver node, since hackers hide the normal routing node. Basically, the hidden node problem is created based on the malicious nodes that are planned to hide the vital relay node in the specific routing path. The packet transmission loss occurred for routing; so, it minimizes the packet delivery ratio and network lifetime. Then, proposed enhanced self‐organization of data packet (EAOD) mechanism is planned to aggregate the data packet sequencially from network structure. The hacker node present in routing path is easy to separate from network with trusty nodes. In order to secure the regular characteristics of organizer node from being confirmed as misbehaving node, the hidden node detection technique is designed for abnormal routing …
引用总数
学术搜索中的文章
P Ganesh, G Naidu, K Swaroopa, R Rahul, A Almadhor… - Wireless Communications and Mobile Computing, 2022