2018
DOI: 10.1007/s11042-018-6777-8
|View full text |Cite|
|
Sign up to set email alerts
|

RETRACTED ARTICLE: Improved encryption protocol for secure communication in trusted MANETs against denial of service attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Therefore to obtain the best path among nodes of origin and destination node, the authors have integrated the firefly optimization algorithm and analyzed the queuing. Anbarasan et al [12] presented a LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol to provide security in the MANET in case of extra resource addition in the network. LEACH protocol group the nodes that consist of CH (Cluster Head) and CM (Cluster Manager) that used to transfer data between the nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore to obtain the best path among nodes of origin and destination node, the authors have integrated the firefly optimization algorithm and analyzed the queuing. Anbarasan et al [12] presented a LEACH (Low-Energy Adaptive Clustering Hierarchy) protocol to provide security in the MANET in case of extra resource addition in the network. LEACH protocol group the nodes that consist of CH (Cluster Head) and CM (Cluster Manager) that used to transfer data between the nodes.…”
Section: Related Workmentioning
confidence: 99%
“…A. AODV AODV is an on-demand routing protocol or a reactive protocol [12]. It uses the destination sequence number to provide a new loop-free path to the destination.…”
Section: Proposed Approach Using Aodv Routing Mechanism and Ffbpmentioning
confidence: 99%
“…Data Encryption Technology is another important research direction of image information security, and its representative methods include secure multiparty computing [13], homomorphism encryption [14], and classification algorithm [15]. References [16][17][18][19] prevent the invasion of the third party by controlling the user communication protocol. References [20][21][22][23] propose using pixel replacement or pixel value substitution to encrypt image content.…”
Section: Introductionmentioning
confidence: 99%