2021
DOI: 10.21203/rs.3.rs-473896/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Shapiro-Wilk Test to Detect The Routing Attacks In MANET

Abstract: In the last recent years, the number of wireless devices has been growing and the security challenges increases too. Mobile Ad hoc Network (MANET) considers as a part of wireless network that connects mobile devices by using wireless channels without infrastructure. MANET use specific protocols to ensure the connectivity and exchange data between the source and destination. Optimized Link State Routing Protocol (OLSR) is a table-driven protocol that keep the route to all destination at any times, unfortunately… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 25 publications
0
4
0
Order By: Relevance
“…Next, the correspondence of results distribution in the data groups to the normal probability law was determined. For this purpose, the graphical method and the Shapiro-Wilk test [20] were used as shown in Fig. 9.…”
Section: Statistical Analysis Of the Resultsmentioning
confidence: 99%
“…Next, the correspondence of results distribution in the data groups to the normal probability law was determined. For this purpose, the graphical method and the Shapiro-Wilk test [20] were used as shown in Fig. 9.…”
Section: Statistical Analysis Of the Resultsmentioning
confidence: 99%
“…While maintaining the optimal scent concentration value and position x, the fruit fly population will utilize visual navigation to fly towards that location as bestSmell = Smellbest (4) and . bestindex) X(:, = X_axis (5) Step 7. Start the iterative optimization process and perform mutation, validation, crossover, and validation operations in sequential order in each iteration.…”
Section: Fruit Fly Algorithmsmentioning
confidence: 99%
“…The simulated topology map is shown below: In Figure 3, according to the standard MPR selection steps described earlier, the selected MPR set is [2,4,6,7,8,10,12,13], with a length of 8. However, the actual optimal MPR set is [3,5,7,9,11,13], with a length of 6.…”
Section: Simulation Scenariomentioning
confidence: 99%
See 1 more Smart Citation