E‐TDGO: An encrypted trust‐based dolphin glowworm optimization for secure routing in mobile ad hoc network

MM Mukhedkar, U Kolekar - International Journal of …, 2020 - Wiley Online Library
Mobile ad hoc networks (MANETs) are independent networks, where mobile nodes
communicate with other nodes through wireless links by multihop transmission. Security is …

T-whale: Trust and whale optimization model for secure routing in mobile ad-hoc network

CR Mohan, AV Reddy - … Journal of Artificial Life Research (IJALR), 2018 - igi-global.com
One of the infrastructureless networks built by various independent mobile nodes is mobile
ad hoc network (MANET), which is an emerging technology, requiring a secure routing …

Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm

MM Mukhedkar, U Kolekar - The Computer Journal, 2019 - academic.oup.com
Routing in mobile ad hoc networks (MANETs) is a hectic challenge due to the dynamic
nature of the network. The provisional communication links are assured due to the …

Optimisation driven-based secure routing in MANET using atom whale optimisation algorithm

SR Halhalli, SR Sugave… - International Journal of …, 2021 - inderscienceonline.com
Mobile ad hoc networks (MANETs) routing is a very challenging task because of the
dynamic nature of the network. The linking of provisional communication assures based on …

Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization

S Ravi, S Matheswaran, U Perumal… - Peer-to-Peer Networking …, 2023 - Springer
Due to the dynamic nature of network topology, routing has been recently identified as the
most serious challenge in MANET. For effective routing in MANET, route discovery and …

FBeeAdHoc: A secure routing protocol for BeeAdHoc based on fuzzy logic in MANETs

MK Rafsanjani, H Fatemidokht - AEU-International Journal of Electronics …, 2015 - Elsevier
Mobile ad hoc network (MANET) is a group of mobile nodes that are formed dynamically by
an autonomous system and communicates with each other without any supporting …

Trust predicated routing framework with optimized cluster head selection using cuckoo search algorithm for MANET

JC Sekhar, RS Prasad - IEIE Transactions on Smart Processing …, 2015 - koreascience.kr
This paper presents a Cuckoo search algorithm to secure adversaries misdirecting multi-hop
routing in Mobile ad hoc networks (MANETs) using a robust Trust Predicated Routing …

[PDF][PDF] Water spider monkey optimization algorithm for trust-based MANET secure routing in IoT

S Nandgave-Usturge - Int J Scientific Res Eng Trends, 2020 - ijsret.com
In Mobile Ad-hoc Network all nodes are moving continuously. Due to dynamic topology
routing in MANET is challenging. Nodes are resource constraint so difficult to employ …

M‐LionWhale: multi‐objective optimisation model for secure routing in mobile ad‐hoc network

RM Chintalapalli, VR Ananthula - IET Communications, 2018 - Wiley Online Library
Mobile ad‐hoc network (MANET) is an emerging technology that comes under the category
of wireless network. Even though the network assumes that all its mobile nodes are trusted …

An approach for optimal-secure multi-path routing and intrusion detection in MANET

N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and
security constraints. Among most of the existing techniques, energy optimization was a …