Secure routing in mobile Ad hoc networks: A predictive approach

AM Desai, RH Jhaveri - International Journal of Information Technology, 2019 - Springer
In recent years, wireless technologies have gained enormous popularity and used vastly in
a variety of applications. Mobile Ad hoc Networks (MANETs) are temporary networks which …

A secure autonomic mobile ad-hoc network based trusted routing proposal

K Dhanya, C Jeyalakshmi… - … Conference on Computer …, 2019 - ieeexplore.ieee.org
This research proposes an inspection on Trust Based Routing protocols to protect Internet of
Things directing to authorize dependability and privacy amid to direction-finding procedure …

Notice of Violation: A Fuzzy Classification Based Trust Model to Aggrandize the Trustworthiness in Unmanned Aerial Vehicle Network (UAVN)

KK Jena, SK Bhoi, CS Sugeeta, JK Sahu… - 2019 International …, 2019 - ieeexplore.ieee.org
Notice of Violation of IEEE Publication Principles “A Fuzzy Classification Based Trust Model
to Aggrandize the Trustworthiness in Unmanned Aerial Vehicle Network (UAVN)” by Kalyan …

[PDF][PDF] Securing public key infrastructure based manets by using efficient trust computation

RM Santhosh - Int Res J Eng Technol (IRJET), 2019 - academia.edu
MANETs are more endangered to various attacks which will lead to various security threats
in the communication between nodes. It needs to be identified and protected from malicious …

Risk Assessment Method for Host Nodes in Software Defined Networking

C Zhou, D Wei, H Cao, J Zhang… - 2019 10th International …, 2019 - ieeexplore.ieee.org
Software Defined Networking (SDN) technology improves the flexibility and scalability of the
network by separating the control plane from the data plane. However, because of its …

[PDF][PDF] A Trust Based Multipath Routing for Black Hole Attacks with Group Search Optimization Routing

A Suresh - International Journal of Innovative Technology and …, 2019 - ir.psgcas.ac.in
The Mobile Ad hoc Network (MANET) is the collection of some mobile devices that
communicate with one another without any help from a centralized administration. For this …

[引用][C] A trust based multipath routing for black hole attacks with group search optimization routing

S Priya, P Suganthy - International Journal of Recent Technology and …, 2019