2019
DOI: 10.1007/s12083-019-00766-8
|View full text |Cite
|
Sign up to set email alerts
|

A trusted fuzzy based stable and secure routing algorithm for effective communication in mobile adhoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
29
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
8

Relationship

2
6

Authors

Journals

citations
Cited by 49 publications
(29 citation statements)
references
References 46 publications
0
29
0
Order By: Relevance
“…Li [9] proposed time-data-driven sleep scheduling and spatial-data-driven anomaly detection approaches to reduce data redundancy. Rajeswari [10] proposed an improved traffic generation mechanism based on TCP/IP protocol to alleviate network congestion. To reduce energy consumption and data loss due to network congestion, Sangeetha [11] proposed an energy-saving congestion control method which periodically adjusts the degree and topology of sensor nodes according to a certain time interval.…”
Section: Related Workmentioning
confidence: 99%
“…Li [9] proposed time-data-driven sleep scheduling and spatial-data-driven anomaly detection approaches to reduce data redundancy. Rajeswari [10] proposed an improved traffic generation mechanism based on TCP/IP protocol to alleviate network congestion. To reduce energy consumption and data loss due to network congestion, Sangeetha [11] proposed an energy-saving congestion control method which periodically adjusts the degree and topology of sensor nodes according to a certain time interval.…”
Section: Related Workmentioning
confidence: 99%
“…However, the proposed technique still faces the challenges on how to revoke and validate the certificate at a node. Rajeswari et al [34] proposed a secure routing approach that integrates two algorithms called a trust-based next forwarding node selection (TNFNS) algorithm and a fuzzy-based stable and secure routing (FBSSR) algorithm. The proposed mechanism provides a solution to the dynamic nature of MANETs with distinct characteristics like resource constraint, decentralized management, frequent mobility, dynamic topology, and control that leads to additional overhead in the provision of safe and steady routing.…”
Section: Related Workmentioning
confidence: 99%
“…The various effective Intrusion Detection Systems [35][36][37][38][39] and intelligent data mining systems [40][41][42][43][44][45] are perceived and discussed by eminent educators in this direction. The conception of intrusion detection started with the work by Anderson [5] that described misuse detection is possible through the audit trails.…”
Section: Related Workmentioning
confidence: 99%
“…Automatic feature selection is obtained using the Correlation based feature selection in [22]. In [23] The standard benchmark dataset called KDD'99 Cup dataset has been used for evaluating the intrusion detection system in the various intrusion detection systems [35][36][37][38][39] and the intelligent agents are also used by various researchers in their prediction and detection systems [40][41][42][43][44][45]. These intelligent systems have been achieved better detection accuracy with less false alarm rate.…”
Section: Related Workmentioning
confidence: 99%