2016
DOI: 10.1007/s11276-016-1288-x
|View full text |Cite
|
Sign up to set email alerts
|

Joint cost and secured node disjoint energy efficient multipath routing in mobile ad hoc network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Unfortunately, this scheme only prevents the kind of wormhole attacks in which malicious nodes try to deceive two nodes into believing that they are neighbours. To boost security and energy efficiency, a multipath routing protocol is developed in [98]. However, the behavior of this protocol is not investigated in the presence of traffic, mobility, and transmission range.…”
Section: Related Workmentioning
confidence: 99%
“…Unfortunately, this scheme only prevents the kind of wormhole attacks in which malicious nodes try to deceive two nodes into believing that they are neighbours. To boost security and energy efficiency, a multipath routing protocol is developed in [98]. However, the behavior of this protocol is not investigated in the presence of traffic, mobility, and transmission range.…”
Section: Related Workmentioning
confidence: 99%
“…In [10,21], multiple paths were established by utilizing the redundancy of wireless sensor nodes to ensure the reliability of data transmission. The authors of [22] presented a multipath routing protocol to ensure network security by building node disjoint paths. 5.…”
Section: Intrusion Detection Intrusion Detection Is Used To Detect Amentioning
confidence: 99%
“…14,15 If the layer 2 attributes also have sub-attributes, the 3rd and 4th layer structures can be further constructed up to the k-1th layer. 14,15 If the layer 2 attributes also have sub-attributes, the 3rd and 4th layer structures can be further constructed up to the k-1th layer.…”
Section: Alternate Transit Data Centersmentioning
confidence: 99%
“…The popularity of the content is related to the geographic location of the user and the population size of the location. 14,15 If the layer 2 attributes also have sub-attributes, the 3rd and 4th layer structures can be further constructed up to the k-1th layer. The k th layer is the various alternatives and represents the source of the above-mentioned attribute values, that is, each candidate transit data center.…”
Section: Alternate Transit Data Centersmentioning
confidence: 99%