Journal articles on the topic 'Secure MANET routing with trust intrigue'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure MANET routing with trust intrigue.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Syed, Salman Ali, and Shahzad Ali. "Enhanced dynamic source routing for verifying trust in mobile ad hoc network for secure routing." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 1 (February 1, 2022): 425. http://dx.doi.org/10.11591/ijece.v12i1.pp425-430.
Full textMahendrakar Shaymrao, Swetha, Pushpa Sothenahalli Krishnaraju, Thungamani Mahalingappa, and Manjunath Thimmasandra Narayanappa. "Design and development of anonymous location based routing for mobile ad-hoc network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (June 1, 2022): 2743. http://dx.doi.org/10.11591/ijece.v12i3.pp2743-2755.
Full textDivya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.
Full textBharti, Meena, Shaveta Rani, and Paramjeet Singh. "Efficient Cluster Head Selection and Trust Based Routing in MANET." Journal of Physics: Conference Series 2327, no. 1 (August 1, 2022): 012049. http://dx.doi.org/10.1088/1742-6596/2327/1/012049.
Full textBhattacherjee, Vandana, Charu Wahi, and Shampa Chakraverty. "A trust-based secure AODV routing scheme for MANET." International Journal of Ad Hoc and Ubiquitous Computing 38, no. 4 (2021): 231. http://dx.doi.org/10.1504/ijahuc.2021.10043587.
Full textWahi, Charu, Shampa Chakraverty, and Vandana Bhattacherjee. "A trust-based secure AODV routing scheme for MANET." International Journal of Ad Hoc and Ubiquitous Computing 38, no. 4 (2021): 231. http://dx.doi.org/10.1504/ijahuc.2021.119853.
Full textRajkumar, Banoth, and G. Narsimha. "Trust Based Certificate Revocation for Secure Routing in MANET." Procedia Computer Science 92 (2016): 431–41. http://dx.doi.org/10.1016/j.procs.2016.07.334.
Full textMohan, Ch Ram, and A. Venugopal Reddy. "T-Whale." International Journal of Artificial Life Research 8, no. 2 (July 2018): 67–79. http://dx.doi.org/10.4018/ijalr.2018070104.
Full textSinha, Ditipriya, Uma Bhattacharya, and Rituparna Chaki. "RSRP: A Robust Secure Routing Protocol in MANET." Foundations of Computing and Decision Sciences 39, no. 2 (May 1, 2014): 129–54. http://dx.doi.org/10.2478/fcds-2014-0008.
Full textgraha, Anu, and Krishna veni. "An Efficient and Secure Routing in MANET using Trust Model." International Journal of Engineering Trends and Technology 70, no. 9 (October 31, 2022): 330–36. http://dx.doi.org/10.14445/22315381/ijett-v70i9p232.
Full textZafar, Sherin, and Neha Sharma. "Inculcating Trust in Hybrid Routing Approach for Securing MANET." International Journal of End-User Computing and Development 8, no. 2 (July 2019): 18–28. http://dx.doi.org/10.4018/ijeucd.2019070102.
Full textEt.al, Mrs Swetha M. S. "Strong Secure Anonymous Location Based Routing (S2ALBR) method for MANET." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 11, 2021): 4349–56. http://dx.doi.org/10.17762/turcomat.v12i3.1726.
Full textSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (April 30, 2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Full textSirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.
Full textAnantapur, Mallikarjuna, and Patil Venkanagouda. "PUSR: Position Update Secure Routing protocol for MANET." International Journal of Intelligent Engineering and Systems 14, no. 1 (February 28, 2021): 93–102. http://dx.doi.org/10.22266/ijies2021.0228.10.
Full textYang, Hwanseok. "A Study on Improving Secure Routing Performance Using Trust Model in MANET." Mobile Information Systems 2020 (September 16, 2020): 1–17. http://dx.doi.org/10.1155/2020/8819587.
Full textSarbhukan, Vaishali V., and Lata Ragha. "Establishing Secure Routing Path Using Trust to Enhance Security in MANET." Wireless Personal Communications 110, no. 1 (August 28, 2019): 245–55. http://dx.doi.org/10.1007/s11277-019-06724-0.
Full textYamparala, Rajesh, and Sankara Narayanan Selvaraj Pandian. "A Neighbor Trust Weight Based Cryptography for Multi Key Distribution for Improving Quality of Service in MANETS." Ingénierie des systèmes d information 27, no. 5 (October 31, 2022): 757–65. http://dx.doi.org/10.18280/isi.270508.
Full textBhaskar .Ch, Vijaya, D. S. R. Murthy, and V. Kakulapati. "AODV (ST_AODV) on MANETs with Path Security and Trust-based Routing." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 11 (November 30, 2022): 01–06. http://dx.doi.org/10.17762/ijritcc.v10i11.5772.
Full textMukhedkar, Moresh Madhukar, and Uttam Kolekar. "Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm." Computer Journal 62, no. 10 (August 15, 2019): 1528–45. http://dx.doi.org/10.1093/comjnl/bxz061.
Full textL, Raghavendar Raju, and C. R. K. Reddy. "Node activity based trust and reputation estimation approach for secure and QoS routing in MANET." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (December 1, 2019): 5340. http://dx.doi.org/10.11591/ijece.v9i6.pp5340-5350.
Full textR.Gandhi, Jenish, and Rutvij H. Jhaveri. "Packet Forwarding Misbehaviour Isolation using Fuzzy Trust-based Secure Routing in MANET." International Journal of Computer Applications 122, no. 3 (July 18, 2015): 30–35. http://dx.doi.org/10.5120/21684-4786.
Full textRajeswari, Alagan Ramasamy, Wen-Cheng Lai, C. Kavitha, Prabhu Kavin Balasubramanian, and S. R. Srividhya. "A Trust-Based Secure Neuro Fuzzy Clustering Technique for Mobile Ad Hoc Networks." Electronics 12, no. 2 (January 5, 2023): 274. http://dx.doi.org/10.3390/electronics12020274.
Full textJayaprakash, R., and B. Radha. "An Implementation of Trusted Key Management Protocol (TKMP) in Wireless Network." Journal of Computational and Theoretical Nanoscience 17, no. 12 (December 1, 2020): 5243–49. http://dx.doi.org/10.1166/jctn.2020.9415.
Full textYang, Hwanseok. "A Study on Secure Routing Technique using Trust Value and Key in MANET." Journal of the Korea Society of Digital Industry and Information Management 11, no. 3 (September 30, 2015): 69–77. http://dx.doi.org/10.17662/ksdim.2015.11.3.069.
Full textRam Mohan, Ch, and Venugopal Reddy Ananthula. "Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization." International Journal of Modeling, Simulation, and Scientific Computing 10, no. 03 (June 2019): 1950014. http://dx.doi.org/10.1142/s1793962319500144.
Full textSuma, Putra, and Mohammed Ali Hussain. "FractWhale-DSR: Fractional Whale Optimization Based Secure Dynamic Source Routing Algorithm for Mobile Ad-hoc Network." Recent Advances in Computer Science and Communications 13, no. 5 (November 5, 2020): 942–56. http://dx.doi.org/10.2174/2213275912666190715165444.
Full textBaba, Abubakar M., Simon, T. Apeh, and Kachikwu, B. Erameh. "Towards The Development Of A Hybrid Routing Protocol For Flooding Attacks Mitigation In MANET." Advances in Multidisciplinary and scientific Research Journal Publication 29 (December 15, 2021): 153–62. http://dx.doi.org/10.22624/aims/abmic2021p12.
Full textBhavsar, Krunal Sudhirbhai. "Secure And Energy Efficient Stochastic Optimized Routing Protocol for Mobile Ad Hoc Network." Asian Journal of Electrical Sciences 9, no. 2 (May 30, 2021): 1–8. http://dx.doi.org/10.51983/ajes-2020.9.2.2549.
Full textAlappatt, Valanto, and Joe Prathap P. M. "Trust-Based Energy Efficient Secure Multipath Routing in MANET Using LF-SSO and SH2E." International Journal of Computer Networks and Applications 8, no. 4 (August 31, 2021): 400. http://dx.doi.org/10.22247/ijcna/2021/209706.
Full textHemalatha, S., Pravin R. Kshirsagar, Hariprasath Manoharan, N. Vasantha Gowri, A. Vani, Sana Qaiyum, P. Vijayakumar, et al. "Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–9. http://dx.doi.org/10.1155/2022/6776378.
Full textSamreen, Shirina. "Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework." International Journal of Mobile Computing and Multimedia Communications 9, no. 3 (July 2018): 60–75. http://dx.doi.org/10.4018/ijmcmc.2018070104.
Full textN, SUMA, and GOPINATH S. "Design and Development of Network Reliability based Secure Multicast Routing Protocol for MANET." JOURNAL OF ADVANCES IN CHEMISTRY 13, no. 10 (February 25, 2017): 6563–69. http://dx.doi.org/10.24297/jac.v13i10.5769.
Full textM., Anugraha, and Dr Krishnaveni S.H. "SRTE: Security Resource Allocation for Trust Model in Evaluate the Strong Node." Webology 19, no. 1 (January 20, 2022): 1387–97. http://dx.doi.org/10.14704/web/v19i1/web19092.
Full textDivya, K., and B. Srinivasan. "A Trust-Based Predictive Model for Mobile Ad Hoc Networks." International Journal on AdHoc Networking Systems 11, no. 03 (July 31, 2021): 13–23. http://dx.doi.org/10.5121/ijans.2021.11302.
Full textLwin, May Thura, Jinhyuk Yim, and Young-Bae Ko. "Blockchain-Based Lightweight Trust Management in Mobile Ad-Hoc Networks." Sensors 20, no. 3 (January 27, 2020): 698. http://dx.doi.org/10.3390/s20030698.
Full textPapaj, Jan, and Lubomir Dobos. "Cooperation between Trust and Routing Mechanisms for Relay Node Selection in Hybrid MANET-DTN." Mobile Information Systems 2016 (2016): 1–18. http://dx.doi.org/10.1155/2016/7353691.
Full textBondada, Praveen, Debabrata Samanta, Manjit Kaur, and Heung-No Lee. "Data Security-Based Routing in MANETs Using Key Management Mechanism." Applied Sciences 12, no. 3 (January 20, 2022): 1041. http://dx.doi.org/10.3390/app12031041.
Full textSubathra, P., S. Sivagurunathan, and N. Ramaraj. "Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks." International Journal of Business Data Communications and Networking 6, no. 1 (January 2010): 38–57. http://dx.doi.org/10.4018/jbdcn.2010010103.
Full textAnnepu, Arudra, and Priti Mishra. "Secure Aware Cluster-Based Routing For Manet Using A Multi-Objective-Trust Centric Flower Pollination Algorithm." International Journal of Engineering Trends and Technology 70, no. 1 (January 25, 2022): 252–58. http://dx.doi.org/10.14445/22315381/ijett-v70i1p230.
Full textAlnumay, Waleed, Uttam Ghosh, and Pushpita Chatterjee. "A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things." Sensors 19, no. 6 (March 26, 2019): 1467. http://dx.doi.org/10.3390/s19061467.
Full textSaha, Himadri Nath, Rohit Singh, Debika Bhattacharyya, and P. K. Banerjee. "Modified Fidelity Based On-Demand Secure (MFBOD) Routing Protocol in Mobile Ad-Hoc Network." Foundations of Computing and Decision Sciences 40, no. 4 (December 1, 2015): 267–98. http://dx.doi.org/10.1515/fcds-2015-0016.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textPonguwala, Maitreyi, and DR Sreenivasa Rao. "Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications." EAI Endorsed Transactions on Energy Web 6, no. 24 (October 16, 2019): 160834. http://dx.doi.org/10.4108/eai.13-7-2018.160834.
Full textMaheshwari, Uma, Suresh .., Mahendra .., Kadiyam .., and Manideepika Manchikalapati. "Analysis of Security Mechanism in Adhoc Network with Machine Learning Techniques." International Journal of Wireless and Ad Hoc Communication, no. 1 (2019): 31–44. http://dx.doi.org/10.54216/ijwac.000103.
Full textKondaiah, Ramireddy, and Bachala Sathyanarayana. "Trust Factor and Fuzzy Firefly Integrated Particle Swarm Optimization Based Intrusion Detection and Prevention System for Secure Routing of MANET." International journal of Computer Networks & Communications 10, no. 1 (January 30, 2018): 13–33. http://dx.doi.org/10.5121/ijcnc.2018.10102.
Full text"Fuzzy based Combined Trust Scheme for Secure Routing in MANET (FCTRS)." International Journal of Innovative Technology and Exploring Engineering 9, no. 4 (February 10, 2020): 1469–74. http://dx.doi.org/10.35940/ijitee.d1527.029420.
Full text"Hybrid PSGWO Algorithm for Trust-Based Secure Routing in MANET." Journal of Networking and Communication Systems (JNACS) 2, no. 3 (July 25, 2019). http://dx.doi.org/10.46253/jnacs.v2i3.a1.
Full text"Mobility Aware Energy Efficient Cluster Based Secure Routing Protocol for Mobile Adhoc Networks." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (November 10, 2019): 3609–13. http://dx.doi.org/10.35940/ijitee.a4621.119119.
Full textArumugam, Uma Maheswari, and Suganthi Perumal. "Trust based Secure and Reliable Routing Protocol of Military Communication on MANETs." Journal of Machine and Computing, January 5, 2023, 47–57. http://dx.doi.org/10.53759/7669/jmc202303006.
Full text