2022
DOI: 10.1007/s11276-022-03021-w
|View full text |Cite
|
Sign up to set email alerts
|

Secure energy aware routing protocol for trust management using enhanced Dempster Shafer evidence model in multi-hop UWAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 29 publications
0
3
0
Order By: Relevance
“…After finding the sink node and routing path in the cluster through the routing protocol, CT-EDS-BBO evaluated node trust degree using DST. Bidirectional Butterfly Optimization algorithm could find the best route to transmit data and reduce energy loss [44]. Kashani et al proposed a protocol based on DST and opportunity route (DSTOR).…”
Section: B Dst-based Trust Decisionmentioning
confidence: 99%
“…After finding the sink node and routing path in the cluster through the routing protocol, CT-EDS-BBO evaluated node trust degree using DST. Bidirectional Butterfly Optimization algorithm could find the best route to transmit data and reduce energy loss [44]. Kashani et al proposed a protocol based on DST and opportunity route (DSTOR).…”
Section: B Dst-based Trust Decisionmentioning
confidence: 99%
“…A model called eq(2) can be used to calculate the overall energy needed to send a packet of length l over a distance d. (5) Similar to this, the overall energy used to transport the data stream by eq (6) 𝐸 π‘ π‘š2π‘Žπ‘” = βˆ‘ π‘›βˆˆπ’©,π‘–βˆˆβ„ 𝑦 𝑛,𝑖 (βˆ‘ π‘˜βˆˆπ’¦ 𝐸 𝑛,𝑖,π‘˜ β€²β€² ) (6) The total amount of energy used to send the data packets through eq (7) 𝐸 π‘ π‘š = 𝐸 π‘ π‘š2𝑏𝑠 + 𝐸 π‘ π‘š2π‘Žπ‘” (7) If the entropy fulfils 𝑒…”
Section: Energy Aware Lagrangian Multipliers Based Optimal Data Trans...mentioning
confidence: 99%
“…Many cutting-edge devices are integrated into automatic vehicles, improving navigation through route maps and radio frequency characteristics. Automatic cars still carry a significant danger of being attacked and have the potential to do so with any technology installed in them [6]. The contribution of this research is as follows:…”
Section: Introductionmentioning
confidence: 99%