Agent-based trusted on-demand routing protocol for mobile ad-hoc networks

IT Abdel-Halim, HMA Fahmy, AM Bahaa-Eldin - Wireless Networks, 2015 - Springer
The routing performance in mobile ad hoc networks (MANETs) relies on the co-operation of
the individual nodes that constitute the network. The existence of misbehaving nodes may …

Efficient monitoring for intrusion detection in wireless sensor networks

T Abdellatif, M Mosbah - Concurrency and Computation …, 2020 - Wiley Online Library
In wireless sensor networks (WSN), Intrusion Detection through sensor monitoring enables
the detection of intricate security attacks such as denial of service and routing attacks …

A secure clustering in MANET through direct trust evaluation technique

K Gomathi, B Parvathavarthini - 2015 International Conference …, 2015 - ieeexplore.ieee.org
Ad hoc network is a self organizing wireless network, made up of mobile nodes that act in
both way as node and router. Wired network with fixed infrastructure defense against attacks …

[PDF][PDF] An Outlook on Cryptographic and Trust Methodologies for Clusters Based Security in Mobile Ad Hoc Networks.

VS Janani, MSK Manikandan - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Most of the researches in Mobile Ad Hoc Networks (MANETs) are closely related to security
aspects and security issues. However, providing a security mechanism implicitly has been a …

[PDF][PDF] Trust Sensitive Dual Cluster Head Based Routing Scheme to Isolate Misbehaving Nodes in MANET.

A Subramanian, S Appavupillai - ISIC, 2021 - academia.edu
Routing protocols function as the obligatory force in MANETs to transfer data outside the
physical wireless ranges of the nodes. In hierarchical cluster based routing; cluster head …

SWCA Secure Weighted Clusterhead Election in Mobile Ad Hoc Network

MA Rahou, A Hasbi - … Systems for Sustainable Development (AI2SD'2019 …, 2020 - Springer
Mobile ad hoc networks (Manets) consist of a large number of mobile nodes communicating
in a network using radio signals. Clustering is one of the techniques used to manage data …

Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network

P Annadurai, S Yazhini - International Journal of Security …, 2016 - inderscienceonline.com
In ad hoc networks, routing and security are a very challenging task due to their peculiar
characteristics. Among various routing schemes and providing security for optimising on …

[引用][C] МИНОБРНАУКИ РОССИЙСКОЙ ФЕДЕРАЦИИ Федеральное государственное автономное образовательное учреждение высшего образования « …

ЕС Басан