2018
DOI: 10.1007/978-981-10-8055-5_12
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Swarm-Based Multicast Routing Technique—Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 15 publications
0
5
0
Order By: Relevance
“…However, this method’s limitation is when the attacker has higher energy capacity and higher transmission power, which can easily deceive the sender about its location. Kumari & Sahana (2019) provided a framework using authentication and RSSI against Sybil attack. The RSSI values are calculated from the arrival angle, stored in the database at each node.…”
Section: Survey Methodologymentioning
confidence: 99%
See 1 more Smart Citation
“…However, this method’s limitation is when the attacker has higher energy capacity and higher transmission power, which can easily deceive the sender about its location. Kumari & Sahana (2019) provided a framework using authentication and RSSI against Sybil attack. The RSSI values are calculated from the arrival angle, stored in the database at each node.…”
Section: Survey Methodologymentioning
confidence: 99%
“…IoT represents a collection of “Things” or embedded devices connected using various wireless technologies such as private and public networks ( Atzori, Iera & Morabito, 2010 ). Based on the application domain, IoT applications are classifiable into six groups, for example, health care ( Zeb et al, 2016 ; Ambarkar & Shekokar, 2020 ), environmental ( Kumari & Sahana, 2019 ; Behera et al, 2020 ; Zhuang et al, 2019 ; Jawad et al, 2017 ), smart city ( Santos, Jimenez & Espinosa, 2019 ; Luo, 2019 ), commercial ( Li & Cheffena, 2019 ; Khanna & Tomar, 2016 ), IoT based robotic ( Roy Chowdhury, 2017 ) and industry ( Zhu et al, 2020 ).…”
Section: Introductionmentioning
confidence: 99%
“…There are existing reviews on network optimization that present frameworks for non-blockchain networks [36][37][38][39][40][41][42][43][44]. There are also reviews for blockchain optimization frameworks, which discuss optimized consensus algorithms, thus reducing computational complexity and storage requirements [45][46][47][48][49][50][51][52][53].…”
Section: Introductionmentioning
confidence: 99%
“…The ad hoc networks as whole poses the certain unique characteristics such as dynamically changing network topologies, decentralization, heterogeneity-when the nodes are not of same type, dispersed operation, mobility and energy constraint [12] causing multiple issues in the process of transmitting information's from one end to the other. Form the above listed characteristics of the adhoc or the fly networks, the mobility and the energy constraint of the nodes serve as the prime characteristics that causes issues related to the transmission in the routing of the information paving way for the link failure or the topology change, thus causing failure in the transmission of the information's, the researches proceeded with the aim of envisioning a routing handling the issues of the mobility and energy usage and succeeded in enhancing the network longevity, improving its performance reducing the energy consumption [13] and handling the mobility issues continuing with the same topology throughout the transmission [17], and the routing algorithms based on the evolutionary and the swarm intelligence provided an even enhanced routing, [18], [19], [20] optimizing the energy and the mobility of the network, preventing the dynamic topology changes to a certain extent and enhancing the performance, reducing the link failures.…”
Section: Introductionmentioning
confidence: 99%