2013 10th International ISC Conference on Information Security and Cryptology (ISCISC) 2013
DOI: 10.1109/iscisc.2013.6767346
|View full text |Cite
|
Sign up to set email alerts
|

Secure dominating set-based routing protocol in MANET: Using reputation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…Mohajer et al [23] suggested a reputation based routing protocol that is based on CDS Connected Dominating Set (CDS) for mobile ad-hoc networks (MANETs). They also suggested a weight heuristic that can be applied to each node in MANET in order to choose CDS based on the use of the reputation value.…”
Section: Related Workmentioning
confidence: 99%
“…Mohajer et al [23] suggested a reputation based routing protocol that is based on CDS Connected Dominating Set (CDS) for mobile ad-hoc networks (MANETs). They also suggested a weight heuristic that can be applied to each node in MANET in order to choose CDS based on the use of the reputation value.…”
Section: Related Workmentioning
confidence: 99%
“…The distribution of this composite variable S u follows an exponential function of parameter 𝜇. As a result, the surplus energy presented in this model can be expressed as (18):…”
Section: Uav Ruin Theorymentioning
confidence: 99%
“…Therefore, area coverage also can be considered as an important design parameter in wireless sensor networks. Since sensor nodes may produce considerable redundant data, the similarly produced data packets from numerous nodes can be integrated to reduce the number of transmissions [7]. Data integration is a combination of data from different sources based on a given integration function.…”
Section: -Introductionmentioning
confidence: 99%