咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Selection of intermediate rout... 收藏

Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs

作     者:Balaji, Subbiah Obaidat, Mohammad S. Suthir, Sriram Rajesh, Manoharan Suresh, Koneri Chandrasekaran 

作者机构:Panimalar Engn Coll Dept Comp Sci & Engn Chennai Tamil Nadu India Univ Sharjah Coll Comp & Informat Dept Comp Sci & Engn Sharjah U Arab Emirates Univ Jordan Dept Comp Sci & Engn KAIST Amman Jordan Univ Sci & Technol Dept Comp Sci & Engn Beijing Peoples R China Sanjivani Coll Engn Dept Comp Sci & Engn Ahmednagar India Sri Sairam Inst Technol Dept Comp Sci & Engn Chennai Tamil Nadu India 

出 版 物:《IET NETWORKS》 (IET Netw.)

年 卷 期:2021年第10卷第5期

页      面:246-252页

核心收录:

学科分类:0808[工学-电气工程] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

主  题:Mobile ad hoc networks 

摘      要:A mobile ad hoc network consists of set of mobile nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in mobile ad hoc networks possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need for these security issues is much focused in overcoming the challenges in MANET. The proposed work focuses on the secure communication using a novel approach addressed on radio station problem for route optimization, which is deployed by grey wolf optimization (GWO) algorithm and supportively Task Based Admittance Control Model is proposed to monitor the network flow and to identify the malicious nodes. It is also called as role-based control model. The communication is performed based on the cluster of vast sizes these trusted in node(s) will probably be conveying together, at the same time non-entry correspondence of the non-authorized node(s) to keep on maintaining a stable, anchored, and reliable gathering of mobile nodes. Simulation is performed using network simulator where the network parameters such as throughput, packet delivery ratio, and delay and packet loss are analyzed to identify the malicious nodes.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分