2020
DOI: 10.11591/ijece.v10i5.pp4956-4964
|View full text |Cite
|
Sign up to set email alerts
|

A novel secure routing scheme using probabilistic modelling for better resistivity against lethal attacks

Abstract: Study towards Wireless Adhoc Network dates two decades back with various researchers evolving up with new solutions towards addressing its problems. Irrespective of various other problems, the issues related to the secure routing is yet unsolved owing to massively increasing fatal strategies of the adversary. Review of existing literature shows that the existing secure routing scheme can only govern over the stated attacks reducing the applicability in case of dynamic attacks. Therefore, this manuscript introd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 38 publications
0
1
0
Order By: Relevance
“…Additionally, the system uses an Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  analytical secure routing modeling that continuously checks for harmful activity on surrounding nodes and helps source nodes decide whether to use safe routing. On the other hand, a mathematical model-based approach has been developed to detect the malevolent intent of mobile agents in the event that they go rogue, in order to stop DoS assaults in vehicular ad hoc network (VANET) [30]- [34]. Considering this literature, many ensemble approaches have been suggested in recent works to address the problems with single classifiers [35]- [37].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%
“…Additionally, the system uses an Indonesian J Elec Eng & Comp Sci ISSN: 2502-4752  analytical secure routing modeling that continuously checks for harmful activity on surrounding nodes and helps source nodes decide whether to use safe routing. On the other hand, a mathematical model-based approach has been developed to detect the malevolent intent of mobile agents in the event that they go rogue, in order to stop DoS assaults in vehicular ad hoc network (VANET) [30]- [34]. Considering this literature, many ensemble approaches have been suggested in recent works to address the problems with single classifiers [35]- [37].…”
Section: Figure 2 Overview Of Grey Hole Attack [19]mentioning
confidence: 99%