版权所有:内蒙古大学图书馆 技术提供:维普资讯• 智图
内蒙古自治区呼和浩特市赛罕区大学西街235号 邮编: 010021
作者机构:Panimalar Engn Coll Dept Comp Sci & Engn Chennai Tamil Nadu India Univ Sharjah Coll Comp & Informat Dept Comp Sci & Engn Sharjah U Arab Emirates Univ Jordan Dept Comp Sci & Engn KAIST Amman Jordan Univ Sci & Technol Dept Comp Sci & Engn Beijing Peoples R China Sanjivani Coll Engn Dept Comp Sci & Engn Ahmednagar India Sri Sairam Inst Technol Dept Comp Sci & Engn Chennai Tamil Nadu India
出 版 物:《IET NETWORKS》 (IET Netw.)
年 卷 期:2021年第10卷第5期
页 面:246-252页
核心收录:
学科分类:0808[工学-电气工程] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)]
摘 要:A mobile ad hoc network consists of set of mobile nodes and communication devices to interact without any support of the infrastructure. Unlike wired networks, the challenges faced in mobile ad hoc networks possessed such as security design, network infrastructure, stringent energy resources and network security issues. The need for these security issues is much focused in overcoming the challenges in MANET. The proposed work focuses on the secure communication using a novel approach addressed on radio station problem for route optimization, which is deployed by grey wolf optimization (GWO) algorithm and supportively Task Based Admittance Control Model is proposed to monitor the network flow and to identify the malicious nodes. It is also called as role-based control model. The communication is performed based on the cluster of vast sizes these trusted in node(s) will probably be conveying together, at the same time non-entry correspondence of the non-authorized node(s) to keep on maintaining a stable, anchored, and reliable gathering of mobile nodes. Simulation is performed using network simulator where the network parameters such as throughput, packet delivery ratio, and delay and packet loss are analyzed to identify the malicious nodes.