Secure based traffic engineering model in softwarized networks

O Lemeshko, O Yeremenko… - 2020 IEEE 2nd …, 2020 - ieeexplore.ieee.org
… towards proactive and reactive provision of a given level of network … models and routing
methods seems to be relevant. … Persikov, “Secure Routing in Reliable Networks: Proactive

SARP: secure routing protocol using anonymous authentication in vehicular Ad-hoc networks

B Yelure, S Sonavane - Journal of Ambient Intelligence and Humanized …, 2023 - Springer
… The protocol adopts both proactive and reactive approach. Reactive approach uses route
information at the setup stage to decide the route and proactive phase initiates the route

ARDENT: A Proactive Agent-Based Routing Protocol for Internet of Vehicles

M Mazouzi, K Mershad, O Cheikhrouhou - Wireless Personal …, 2023 - Springer
… to demonstrate its efficacy and superiority over traditional routing methods in IoV scenarios.
… However, like all reactive methods, this method adds latencies that are not suitable for the IoV…

Analysis on Secured Cryptography Models with Robust Authentication and Routing Models in Smart Grid.

CN Priyanka, N Ramachandran - … of Safety & Security …, 2023 - search.ebscohost.com
… We devised an optimization approach to lessen the impact of an initial route failure. A NP-…
models performs mitigation of the negative effects of both proactive and reactive routing

[HTML][HTML] Software-defined networking approaches for link failure recovery: A survey

J Ali, GM Lee, BH Roh, DK Ryu, G Park - Sustainability, 2020 - mdpi.com
… recovery with proactive and reactive approaches is presented with pictorial diagrams. We
compare the proactive and reactive schemes in terms of latency, scalability, routing updates, …

[HTML][HTML] Designing the routing protocol with secured IoT devices and QoS over Manet using trust-based performance evaluation method

P Sathyaraj, D Rukmani Devi - Journal of Ambient Intelligence and …, 2021 - Springer
… This paper proposes a real time secure route analysis (RSRA) approach for the secure routing
… Similarly, Belgaum (2019) presented a reactive secure routing scheme which uses triple …

FEBSRA: Fuzzy trust based energy aware balanced secure routing algorithm for secured communications in WSNs

R Anitha, BRT Bapu, PG Kuppusamy… - Wireless Personal …, 2022 - Springer
network lifetime performance [1]. Furthermore, the majority of secure routing algorithms employ
cryptographic methods … There are numerous proactive and reactive routing protocols for …

Safe routing approach by identifying and subsequently eliminating the attacks in MANET

SM Sankar, D Dhinakaran, CC Deboral… - arXiv preprint arXiv …, 2023 - arxiv.org
… provide secure and trustworthy routing in such a network. According to their architecture and
routing method, routing … : proactive routing protocols, reactive routing protocols, and hybrid …

[HTML][HTML] Prediction of node and link failures in mobile ad hoc network using hello based path recovery routing protocol

S Kumar - Wireless Personal Communications, 2020 - Springer
… These routing approaches can be elaborated into hybrid, proactive [7] and reactive routing
schemes based on the network scaffold [8]. Furthermore, MANET is handled in numerous …

Secure and reliable data forwarding using homomorphic encryption against blackhole attacks in mobile ad hoc networks

E Elmahdi, SM Yoo, K Sharshembiev - Journal of Information Security and …, 2020 - Elsevier
… Hence, a new approach is proposed in this paper to provide reliable and … types of routing
algorithms: the table-driven type (the proactive type) and the on-demand type (the reactive type…