2020
DOI: 10.1007/s12065-020-00388-7
|View full text |Cite
|
Sign up to set email alerts
|

An approach for optimal-secure multi-path routing and intrusion detection in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 39 publications
(33 citation statements)
references
References 26 publications
0
33
0
Order By: Relevance
“…For this concerned we summarize the following papers. Veeraiah, N., Krishna, B.T [6] suggests, based on an optimization algorithm, a powerful multipath routing protocol in MANET. The MANET energy and protection crisis is efficiently tackled using the collection and intrusion mitigation techniques of the cluster head (CH), including fuzzy clustering and fuzzy Naive Bayes (fuzzy NB).…”
Section: A) Literature Reviewmentioning
confidence: 99%
“…For this concerned we summarize the following papers. Veeraiah, N., Krishna, B.T [6] suggests, based on an optimization algorithm, a powerful multipath routing protocol in MANET. The MANET energy and protection crisis is efficiently tackled using the collection and intrusion mitigation techniques of the cluster head (CH), including fuzzy clustering and fuzzy Naive Bayes (fuzzy NB).…”
Section: A) Literature Reviewmentioning
confidence: 99%
“…If F yit > F xit (13) Then Yi is replaced by Xi. Otherwise, Xi which is selected by the source node itself does not change.…”
Section: Tri-of Aodv Based Dso For Secure Routingmentioning
confidence: 99%
“…The trust is estimated based on two factors that are reputation information collection and trust value estimation procedures. A secure and efficient routing protocol (AOMDV) is designed to provide secure routing in the mobile ad-hoc network [13,14]. The MANET is largely utilized in several sensitive and non-sensitive applications.…”
Section: Introductionmentioning
confidence: 99%
“…The other Cuckoo search and M-tree-based approach were proposed by Babu and Ussenaiah (14) to enhance the Adhoc network's performance. The other heuristic and metaheuristic approaches based on an optimization algorithm were developed by several researchers (15)(16)(17)(18)(19)(20)(21)(22)(23)(24)(25)(26)(27)(28) that optimize the network's performance and provide a secure communication environment.…”
Section: Related Workmentioning
confidence: 99%