2019
DOI: 10.1049/iet-com.2019.0039
|View full text |Cite
|
Sign up to set email alerts
|

E 2 ‐SR: a novel energy‐efficient secure routing scheme to protect MANET‐IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
21
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 25 publications
(21 citation statements)
references
References 35 publications
0
21
0
Order By: Relevance
“…. A closer look into expression(8) will show that it is nearly equivalent to the expression (6), and hence they both satisfy the demands of normal distribution. A similar strategy of risk associated with the identification of the attacker can be now stated as,risk = 1 − 3 .…”
mentioning
confidence: 86%
“…. A closer look into expression(8) will show that it is nearly equivalent to the expression (6), and hence they both satisfy the demands of normal distribution. A similar strategy of risk associated with the identification of the attacker can be now stated as,risk = 1 − 3 .…”
mentioning
confidence: 86%
“…It included the historical behaviour of nodes into account in the trust assessment for determined the sequence of trust data. It facilitated the prediction of node's trust based on a weighted Markov Chain (SCGM) measure that aided in better futuristic [19] for guaranteeing data integrity and security in ad hoc networks. This SREEF adopted an authentication scheme that included the benefits of certificate-based hash chain.…”
Section: Related Workmentioning
confidence: 99%
“…The way in which the measure of confidence is generated, allows us to divide the strategies, structures that contain the actions to be developed, into the types mentioned below we will mention the main characteristics [20] of each types: a) Cluster: This trust scheme uses authentication by means of public keys in the evaluation of a node, these are grouped into clusters which allows a group of nodes to monitor the activity of the equipment directly, the nodes certify the trust of a computer which can be verified with the use of the key and a certificate issued by each neighbour, the nodes which issue trust certificates [21,22] which do not coincide with the evaluation of the Cluster would be considered "malicious" nodes and would lose the possibility of participating in the network [23,24]. b) Social networks: Model based on four components on each computer; Monitor that detects unusual behaviour in the nodes, reputation system that allows the nodes to be qualified acording to their routing or data transmission actions, route manager in charge of selecting the routes they present, and a trusted manager that alerts to the so-called malicious nodes.…”
Section: Trusted Modelsmentioning
confidence: 99%