2019
DOI: 10.1007/s11276-019-01955-2
|View full text |Cite
|
Sign up to set email alerts
|

Novel approach of distributed & adaptive trust metrics for MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 130 publications
(65 citation statements)
references
References 48 publications
0
65
0
Order By: Relevance
“…In this section, the performance of our proposed approach is evaluated using NS-2 as the simulation tool, and the results are discussed further. [56][57][58][59][60][61][62] Moreover, the proposed ASDA-RSA are compared with CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES models. It is worth mentioning that all ASDA-RSA, CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES parameters and settings are considered to be equal.…”
Section: Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…In this section, the performance of our proposed approach is evaluated using NS-2 as the simulation tool, and the results are discussed further. [56][57][58][59][60][61][62] Moreover, the proposed ASDA-RSA are compared with CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES models. It is worth mentioning that all ASDA-RSA, CrossLayer, ASDA-BlowFish, ASDA-AES, GA-DoSLD, ASDA-3DES, and ASDA-DES parameters and settings are considered to be equal.…”
Section: Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…Once a malicious node is discovered, it is isolated from the network so that no packet is forwarded through it. Zhang et al [35] proposed a novel approach of the distributed and adaptive trust metrics for MANET based on the one-hop module and multi-hop module. In their paper, the one-hop module was used to calculate direct trust and recommendation trust, and the multi-hop module was used to calculate indirect trust.…”
Section: Trust-based Routing Mechanisms For Manetmentioning
confidence: 99%
“…Even in mobile networks, this trouble was treated extensively by researchers, for example, in previous studies. Moreover, in order to reach the same objective, many sensing and aggregation methods were developed, for instance, in Ma et al 36 and Zhang et al 37 The energy problem has been the subject of several studies in all kinds of networks, such as ad hoc networks, 38 MANET network, 39 and mobile network. A new access protocol was proposed in Zhang et al, 32 aiming to increase data reliability.…”
Section: Figurementioning
confidence: 99%
“…33,34 An interesting method was proposed in Zhang et al, 35 which deals with the creation of new agents. Moreover, in order to reach the same objective, many sensing and aggregation methods were developed, for instance, in Ma et al 36 and Zhang et al 37 The energy problem has been the subject of several studies in all kinds of networks, such as ad hoc networks, 38 MANET network, 39 and mobile network. 40,41 The satellite network in navigation satellite system, which is necessary for mobile monitoring, has many disadvantages such as asymmetric bandwidth, unstable network, and high bit error rate.…”
Section: Figurementioning
confidence: 99%