2022
DOI: 10.1007/s11227-021-04262-w
|View full text |Cite
|
Sign up to set email alerts
|

Type II fuzzy-based clustering with improved ant colony optimization-based routing (t2fcatr) protocol for secured data transmission in manet

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…Aiming at the blindness and relatively slow convergence speed in path planning search, Zhai et al [37] proposed an improved ACO algorithm based on artificial potential field and quantum evolution theory. Nagendranth et al [38] proposed a new algorithm based on type II fuzzy-based clustering with improved ACO algorithm based routing protocol for secure data transmission in manet. Optimizing ACO algorithm to solve the standard TSP, Zeng et al [39] proposed a more general replenishment arc TSP.…”
Section: Improved Aco Algorithmmentioning
confidence: 99%
“…Aiming at the blindness and relatively slow convergence speed in path planning search, Zhai et al [37] proposed an improved ACO algorithm based on artificial potential field and quantum evolution theory. Nagendranth et al [38] proposed a new algorithm based on type II fuzzy-based clustering with improved ACO algorithm based routing protocol for secure data transmission in manet. Optimizing ACO algorithm to solve the standard TSP, Zeng et al [39] proposed a more general replenishment arc TSP.…”
Section: Improved Aco Algorithmmentioning
confidence: 99%
“…The topology of a mobile ad hoc network is constantly changing as nodes move [12]. The radio range of the other nodes in the ad hoc network is continually changing, requiring constant updating of the routing information [13]. MANET's have a wide range of applications, from large-scale moveable and dynamic networks to small networks constrained by their power supply.…”
Section: Literature Surveymentioning
confidence: 99%
“…To determine whether a packet should be sent or received locally, each node within that range must receive it. Even if the majority of these packets are discarded, they use energy under this basic energy model [13]. The capacity of the power management system to respond to variations in traffic load is reflected in the length of the soft-state timer.…”
Section: Literature Surveymentioning
confidence: 99%
“…Then, using the found optimum path, the encrypted DPs are sent from the sender to taget, and lastly, relayed to the base station. [27][28][29][30][31] Because of the constant node migration and the limited resources available, security management is a severe challenge [32][33][34][35][36][37]. Rekeying is only done for the so-called clusters of subnetworks to avoid having to repeatedly renew the group key for the entire wide network.…”
Section: Related Workmentioning
confidence: 99%
“…From this scenario, we can observe the efficacy of the proposed work in the presence of attackers. For comparison, two existing works such as PSO-Secure routing [30], and Fuzzy clustering [31] are considered. Both works have developed in the MANET environment.…”
Section: Comparative Analysismentioning
confidence: 99%