2016
DOI: 10.1007/s11036-016-0703-y
|View full text |Cite
|
Sign up to set email alerts
|

Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…In a simple ant colony optimization meta-heuristic algorithm, when an ant which is named Forward ANT (FANT) departs from the source node S to explore the network, it chooses one neighbor of node S as the next hop node i. The probability of node i being chosen is defined by the following formulas [25]:…”
Section: The Ant Colony Optimization Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…In a simple ant colony optimization meta-heuristic algorithm, when an ant which is named Forward ANT (FANT) departs from the source node S to explore the network, it chooses one neighbor of node S as the next hop node i. The probability of node i being chosen is defined by the following formulas [25]:…”
Section: The Ant Colony Optimization Algorithmmentioning
confidence: 99%
“…Once the FANT has achieved the target location, a corresponding Backward ANT (BANT) backtracks to the source node. During the return trip, the BANT updates the pheromone table at each intermediate node, like shown in Figure 2, according to the reinforcement rule as below [25]:…”
Section: The Ant Colony Optimization Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic design of MANET is presented in Fig 1, where the mobile nodes are connected via a wireless links. The security challenges of MANET [2][3][4]…”
Section: Introductionmentioning
confidence: 99%
“…In this thesis we consider a mobile ad hoc environment, in which all nodes perform five main processes to authenticate the destination node in order to have a secure communication [53] [54]. Different processes are applied to obtained trustful multicertificate chain.…”
Section: Chapter 5 Proposed Self-organized Authentication System Desc...mentioning
confidence: 99%