Seyfollahi et al., 2022 - Google Patents
MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applicationsSeyfollahi et al., 2022
View PDF- Document ID
- 18030063347003480205
- Author
- Seyfollahi A
- Moodi M
- Ghaffari A
- Publication year
- Publication venue
- Computer Standards & Interfaces
External Links
Snippet
The intricate features and autonomous configuration of Routing Protocol for Low-power and Lossy Networks (RPL) make it challenging to provide a key management solution and deploy it on constrained resources sensing systems. So far, various types of attacks, such as …
- 238000000034 method 0 abstract description 45
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/04—Interdomain routing, e.g. hierarchical routing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/48—Routing tree calculation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/12—Shortest path evaluation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance or administration or management of packet switching networks
- H04L41/12—Arrangements for maintenance or administration or management of packet switching networks network topology discovery or management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/02—Communication route or path selection, e.g. power-based or shortest path routing
- H04W40/04—Communication route or path selection, e.g. power-based or shortest path routing based on wireless node resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
- G06F15/16—Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
- G06F15/163—Interprocessor communication
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Seyfollahi et al. | MFO-RPL: A secure RPL-based routing protocol utilizing moth-flame optimizer for the IoT applications | |
Sharma et al. | eeTMFO/GA: a secure and energy efficient cluster head selection in wireless sensor networks | |
Robinson et al. | Energy‐aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks | |
Gurram et al. | A secure energy aware meta-heuristic routing protocol (SEAMHR) for sustainable IoT-wireless sensor network (WSN) | |
Chakraborty et al. | A genetic algorithm inspired routing protocol for wireless sensor networks | |
CN105074735A (en) | Accelerated learning by sharing information between multiple learning machines | |
Hu et al. | An Immune Cooperative Particle Swarm Optimization Algorithm for Fault‐Tolerant Routing Optimization in Heterogeneous Wireless Sensor Networks | |
Ahmadi et al. | A hybrid algorithm for preserving energy and delay routing in mobile ad-hoc networks | |
Kamapantula et al. | Leveraging the robustness of genetic networks: a case study on bio-inspired wireless sensor network topologies | |
Hu et al. | Trust‐aware secure routing protocol for wireless sensor networks | |
Sharmin et al. | A novel bio-inspired routing algorithm based on ACO for WSNs | |
Thorat et al. | Opportunistic routing in presence of selfish nodes for MANET | |
Yang et al. | Comparative analysis of routing schemes based on machine learning | |
Boukerche et al. | Efficient and robust serial query processing approach for large-scale wireless sensor networks | |
Rajeesh Kumar et al. | Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT | |
Aluvala et al. | Secure routing in MANETS using adaptive cuckoo search and entropy based signature authentication | |
Turlykozhayeva et al. | EVALUATING ROUTING ALGORITHMS ACROSS DIFFERENT WIRELESS MESH NETWORK TOPOLOGIES USING NS-3 SIMULATOR. | |
Bahattab | Designing ROACM routing protocol along with bandwidth allocation using seagull optimization for ad hoc wireless network | |
Manda et al. | CVFP: Energy and trust aware data routing protocol based on Competitive Verse Flower Pollination algorithm in IoT | |
Lu et al. | GTD3-NET: A deep reinforcement learning-based routing optimization algorithm for wireless networks | |
Bawa et al. | An efficient novel key management scheme for enhancing user authentication in a WSN | |
Sahhaf et al. | Routing at large scale: Advances and challenges for complex networks | |
Zhang et al. | Spacial mobility prediction based routing scheme in delay/disruption-tolerant networks | |
Lu et al. | Maximizing multicast lifetime in unreliable wireless ad hoc network | |
Anker et al. | Belief propagation in wireless sensor networks-a practical approach |