Secure distance based multi-objective artificial rabbits algorithm for clustering and routing in cognitive radio network

KNS Gudihatti, KP Kumar - International Journal of Advanced …, 2023 - search.proquest.com
Cognitive radio networks (CRNs) are presently undergoing extensive research and are
gaining popularity in a wide range of applications. The nodes in a cognitive radio sensor …

Trust Aware Secured Data Transmission Based Routing Strategy Using Optimal Ch Selection in Mobile Ad-Hoc Network

KS Sankaran, SP Hong - Mobile Networks and Applications, 2023 - Springer
Abstract In Mobile Ad-hoc Network (MANET), the secured means of transferring data over
malicious nodes is being considered as a significant aspect. The assurance of trust among …

Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization

S Ravi, S Matheswaran, U Perumal… - Peer-to-Peer Networking …, 2023 - Springer
Due to the dynamic nature of network topology, routing has been recently identified as the
most serious challenge in MANET. For effective routing in MANET, route discovery and …

T-whale: Trust and whale optimization model for secure routing in mobile ad-hoc network

CR Mohan, AV Reddy - … Journal of Artificial Life Research (IJALR), 2018 - igi-global.com
One of the infrastructureless networks built by various independent mobile nodes is mobile
ad hoc network (MANET), which is an emerging technology, requiring a secure routing …

Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization

C Ram Mohan, VR Ananthula - International Journal of Modeling …, 2019 - World Scientific
The advancements in Mobile Ad-hoc Network (MANET) are suitable to wide applications,
which involve military applications, civilian domains, and disaster recovery systems. It is …

Cognitive-based routing model with identity-based cryptography in MANET

G Shanthi, MSG Durga - International Journal of Mobile …, 2018 - inderscienceonline.com
In MANET, trust-based routing algorithm is the major protocol for selecting optimal route
path. The optimal path is selected based on the available maximum path trust value in the …

[PDF][PDF] Trust aware aquila optimizer based secure data transmission for information management in wireless sensor networks

AZ Abualkishik, AA Alwan - Journal of Cybersecurity and …, 2022 - researchgate.net
The province of wireless sensor network (WSN) is increasing continuously because of wide-
ranging applications, namely, monitoring environmental conditions, military, and many other …

An efficient trust-based routing model for clustered-based hetrogeneous wireless sensor network

G Thaniyath - … Journal of Business Data Communications and …, 2020 - igi-global.com
Wireless sensor networks (WSN) play a very important role in providing real-time data
access for big data and IoT application. The open deployment, energy constraint, and lack of …

An Efficient Trust-Based Routing Scheme by Max-Min Composition of Fuzzy Logic for MANET

J Kundu, K Majumder, D De - … of the International Conference on Recent …, 2016 - Springer
Mobile ad hoc network is an infrastructure-less network of distributed nodes. It is
spontaneous, self-organized, and also dynamic. In ad hoc environment, due to frequent …

[PDF][PDF] Bee inspired secured protocol for routing in cognitive radio ad hoc networks

J Ramkumar, R Vadivel - Indian J. Sci. Technol, 2020 - researchgate.net
Background: Enhancing security and minimizing the delay is a significant task present in all
modern networks. Dynamic emerging problems like node failure, route failure, intrusions …