2014 Sixth International Conference on Advanced Computing (ICoAC) 2014
DOI: 10.1109/icoac.2014.7229731
|View full text |Cite
|
Sign up to set email alerts
|

Detecting malicious nodes in MANET using rateless codes for maximum content distribution

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

2
0

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…Compared to the DSBRM and EEPPM models, the proposed model utilizes much less power. Because all nodes in the proposed model must compute their keys, but only when they deviate from their usual behavior [48][49][50][51][52].…”
Section: Power Consumption Analysismentioning
confidence: 99%
“…Compared to the DSBRM and EEPPM models, the proposed model utilizes much less power. Because all nodes in the proposed model must compute their keys, but only when they deviate from their usual behavior [48][49][50][51][52].…”
Section: Power Consumption Analysismentioning
confidence: 99%
“…It allows a node on the network to communicate securely by sharing cryptographic keys. The shared key is calculated at the two endpoints using elliptic curve cryptography (ECC), and the ciphertext transfers using the key exchange for communicating data [18][19][20][21][22]. The sender encrypts the data and sends this to the next hop using a secret key.…”
Section: Key Generationmentioning
confidence: 99%