Mandhare et al., 2018 - Google Patents
Performance analysis of trust-based routing protocol for MANETMandhare et al., 2018
View PDF- Document ID
- 4282878288255118212
- Author
- Mandhare A
- Kadam S
- Publication year
- Publication venue
- Computing, Communication and Signal Processing: Proceedings of ICCASP 2018
External Links
Snippet
Mobile Ad hoc network (MANET) is a self-motivated network. Nodes are freely moved anywhere inside the network. They can enter and depart the network at any instance. Due to loss of infrastructure in the network frequent link failures occurred. So the special classes of …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/56—Packet switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L47/00—Traffic regulation in packet switching networks
- H04L47/10—Flow control or congestion control
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Haseeb et al. | Intrusion prevention framework for secure routing in WSN-based mobile Internet of Things | |
| Alaya et al. | Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networks | |
| Tamil Selvi et al. | A novel algorithm for enhancement of energy efficient zone based routing protocol for MANET | |
| Harold Robinson et al. | MTPKM: Multipart trust based public key management technique to reduce security vulnerability in mobile ad-hoc networks | |
| Haseeb et al. | Efficient and trusted autonomous vehicle routing protocol for 6G networks with computational intelligence | |
| Gopala Krishnan et al. | Energy and trust management framework for MANET using clustering algorithm | |
| Lin et al. | PA-SHWMP: a privacy-aware secure hybrid wireless mesh protocol for IEEE 802.11 s wireless mesh networks | |
| Alghamdi | Convolutional technique for enhancing security in wireless sensor networks against malicious nodes | |
| Sadakale et al. | TAD‐HOC routing protocol for efficient VANET and infrastructure‐oriented communication network | |
| Bala et al. | An enhanced intrusion detection system for mobile ad-hoc network based on traffic analysis | |
| Tripathi et al. | ReTrust: reliability and recommendation trust-based scheme for secure data sharing among internet of vehicles (IoV) | |
| Mandhare et al. | Performance analysis of trust-based routing protocol for MANET | |
| Jamaesha et al. | A secure and efficient cluster based location aware routing protocol in MANET | |
| Venu et al. | Energy and cluster based efficient routing for broadcasting in mobile ad hoc networks | |
| Baumgartner et al. | Resilient enhancements of routing protocols in MANET | |
| Hemanand et al. | FSSAM: a five stage security analysis model for detecting and preventing wormhole attack in mobile ad-hoc networks using adaptive atom search algorithm | |
| Shanthi et al. | Secure and efficient distance effect routing algorithm for mobility (se_dream) in manets | |
| Bazeer Ahamed et al. | Dynamic secure power management system in mobile wireless sensor network | |
| Khalladi et al. | A new efficient approach for detecting single and multiple black hole attacks | |
| Saini et al. | A trust-based secure hybrid framework for routing in WSN | |
| Sahu et al. | QoS-Aware Unicasting Hybrid Routing Protocol for MANETs | |
| Pandey et al. | An energy-efficient intrusion detection system for MANET | |
| Suresh Babu et al. | Efficient DNA-based cryptographic mechanism to defend and detect blackhole attack in MANETs | |
| Singh et al. | An improved mechanism to prevent blackhole attack in manet | |
| Brindha et al. | Data dependability based bimodal encryption scheme for distributed routing in wireless sensor networks |