2021
DOI: 10.1109/access.2021.3133882
|View full text |Cite
|
Sign up to set email alerts
|

An Improved Hybrid Secure Multipath Routing Protocol for MANET

Abstract: Mobile ad hoc networks (MANETs) are self-organizing nodes in a mobile network that collaborate to form dynamic network architecture to establish connections. In MANET, data must traverse several intermediary nodes before reaching its destination. There must be security in place to prevent hostile nodes from accessing this data. Multiple methods were suggested in literature for securing routing; these techniques tackle different aspects of security. In order to enhance fault tolerance, wireless network multipat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
81
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 136 publications
(82 citation statements)
references
References 25 publications
0
81
0
1
Order By: Relevance
“…The chaotic values 𝜔 generated by a logistical map with three hundred runs and 𝜔 = 0.001 is represented by. In the case of CKHA [22], The standard KH method adapts the Lagrangian algorithm as follows:…”
Section: Process Involved In Ckha-based Clustering Techniquementioning
confidence: 99%
See 2 more Smart Citations
“…The chaotic values 𝜔 generated by a logistical map with three hundred runs and 𝜔 = 0.001 is represented by. In the case of CKHA [22], The standard KH method adapts the Lagrangian algorithm as follows:…”
Section: Process Involved In Ckha-based Clustering Techniquementioning
confidence: 99%
“…The chaotic values ω chebychev j generated by a logistical map with three hundred runs and ω chebychev 0 = 0.001 is represented by. In the case of CKHA [22],…”
Section: Process Involved In Ckha-based Clustering Techniquementioning
confidence: 99%
See 1 more Smart Citation
“…These questions are recently very intensively studied and published. Some of them analyze the robustness of routing protocols for MANET, proposing modifications of the classical algorithms such as OLSR [16], or new hybrid solutions [17], Key Management Method [18], and method using efficient trust establishment [19]. Comparative analysis of chosen routing algorithms security is presented in [20][21][22], and the intrusive detection methods using ML algorithms are proposed for MANET by [23].…”
Section: Military Network Architecturementioning
confidence: 99%
“…Recently, many secure and energy-aware multipath routing protocols have been designed for MANETs, such as the Trust Aware Secure Energy Efficient Hybrid Protocol (TASEEHP) [22], Hybrid Secure Multipath Routing Protocol (HSMRP) [23], Signcryption Technique (ST) [24], and Recurrent Reward-Based Learning (RRBL) [25]. These protocols have shown remarkable performance against various security threats.…”
Section: Introductionmentioning
confidence: 99%