2023
DOI: 10.1002/cpe.7599
|View full text |Cite
|
Sign up to set email alerts
|

Trust aware ad hoc routing protocol with key management based mechanism and optimal energy‐efficient cluster head selection in mobile ad hoc networks

Abstract: The implementation of Mobile Ad hoc Networks in numerous domains is necessitated by the fast evolving wireless service requirements as well as deployment demands over the last few decades. The application areas are environmental monitoring, disaster rescue operations, military communications, and other safety-critical sectors.The underlying routing protocol has a considerable impact on the effectiveness of an ad hoc network deployment in a specific situation. MANETs are vulnerable to major security risks that … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…A secure and low-power routing system based on group key management is proposed by Saravanan et al [20]. With the goal of establishing the trust among connected nodes, Particle Swarm Optimisation (PSO) was originally adopted for malicious node detection, with the expectation that all nodes involved would generate and disseminate content that was genuine, accurate, and trustworthy.…”
Section: Related Workmentioning
confidence: 99%
“…A secure and low-power routing system based on group key management is proposed by Saravanan et al [20]. With the goal of establishing the trust among connected nodes, Particle Swarm Optimisation (PSO) was originally adopted for malicious node detection, with the expectation that all nodes involved would generate and disseminate content that was genuine, accurate, and trustworthy.…”
Section: Related Workmentioning
confidence: 99%
“…A dual-purpose routing mechanism-safety and energy efficiency-is presented [24]. It utilizes group key management.…”
Section: Introductionmentioning
confidence: 99%