2019
DOI: 10.1007/978-981-13-9330-3_18
|View full text |Cite
|
Sign up to set email alerts
|

ACO-Based Secure Routing Protocols in MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…The performance metrics, such as computational overhead, latency, packet delivery rate, network life time, security level, successful message rate, key agreement time, energy consumption is anlayzed. The obtained results are compared with existing methods, like hybridizing the popular Diffie‐Hellman model of key exchange and elliptic curve cryptography (HDHECC) HDHECC‐GKM‐ MANETs, 24 hexagonal clustered trust based distributed group key management in mobile ad hoc networks (HCTD‐GKM‐MANETs), 25 ant colony optimization (ACO) based group key management in mobile ad hoc networks(ACO‐GKM‐MANETs) 26 …”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The performance metrics, such as computational overhead, latency, packet delivery rate, network life time, security level, successful message rate, key agreement time, energy consumption is anlayzed. The obtained results are compared with existing methods, like hybridizing the popular Diffie‐Hellman model of key exchange and elliptic curve cryptography (HDHECC) HDHECC‐GKM‐ MANETs, 24 hexagonal clustered trust based distributed group key management in mobile ad hoc networks (HCTD‐GKM‐MANETs), 25 ant colony optimization (ACO) based group key management in mobile ad hoc networks(ACO‐GKM‐MANETs) 26 …”
Section: Resultsmentioning
confidence: 99%
“…Panda and Pattanayak 26 have presented an ant colony optimization based secure routing protocols in MANETs. Routing in MANET was related to a set of complexities that required to be solved before its execution.…”
Section: Literature Surveymentioning
confidence: 99%
See 2 more Smart Citations
“…Again, security concerns could be made by means of different procedures and out from these; evolutionary technique-based procedures emerged as more efficient for the use. A widespread evaluation of ACO-based secure MANET routing protocols was carried and the findings of this study can assist researchers in the field MANET to develop secure protocols, particularly with ACO to address the safety concerns in MANETs [7].…”
Section: Malik Et Al (2020) Proposed An Enhancing Security Usingmentioning
confidence: 99%