Novel fuzzy based crow search optimization algorithm for secure node-to-node data transmission in WSN
SG Qureshi, SK Shandilya - Wireless personal communications, 2022 - Springer
Various sensor nodes are interconnected with each other in wireless sensor network (WSN).
WSN communicates to every node within the network wirelessly to collect data regarding the …
WSN communicates to every node within the network wirelessly to collect data regarding the …
Grey clustering model based on kernel and information field
D Luo, Z Huihui - Grey Systems: Theory and Application, 2020 - emerald.com
Purpose The purpose of this paper is to propose a grey clustering model based on kernel
and information field to deal with the situation in which both the observation values and the …
and information field to deal with the situation in which both the observation values and the …
Hybrid trust and weight evaluation-based trust assessment using ECK-ANFIS and AOMDV-REPO-based optimal routing in MANET environment
L Dupak, S Banerjee - The Journal of Supercomputing, 2022 - Springer
Many researchers have been inspired to work on diverse challenges by a particularly
favourable platform, namely mobile ad hoc networks (MANET) routing optimization …
favourable platform, namely mobile ad hoc networks (MANET) routing optimization …
[PDF][PDF] An adaptive secure and efficient bio-inspired routing protocol for effective cooperation in FANETs
A Beghriche - Ingénierie des Systèmes d'Information, 2023 - academia.edu
Accepted: 10 February 2023 The advancement of automated systems and their capabilities
stimulate the formation of ad hoc networks using Unmanned Aerial Vehicles (UAVs). The …
stimulate the formation of ad hoc networks using Unmanned Aerial Vehicles (UAVs). The …
[PDF][PDF] Integrating Intelligent Systems in MANET-IoT Environment based on Subjective Context
A ALAZZAWI - Iraqi Journal For Computer Science and Mathematics, 2024 - iasj.net
The Internet of Things (IoT) has cultivated a promising environment, pivotal across diverse
sectors via MANET protocols within the www This technology significantly contributes to …
sectors via MANET protocols within the www This technology significantly contributes to …
Navigating Legal Implications: The Impact of Enhanced Smartphone Integration on Security in Organizational Networks
K Ohei - Khazanah Hukum, 2023 - journal.uinsgd.ac.id
The escalating integration of smartphones within organizational frameworks has been
driven by their augmented functionality, especially pertinent during the global pandemic …
driven by their augmented functionality, especially pertinent during the global pandemic …
NMTBR: Normalized Multilevel Trust Based Routing for Security Against Packet Drop Attacks in MANETs.
Purpose: This paper aims to put forward a quarantine phased normalized multilevel trust
based routing mechanism for mitigation of packet drop attacks in MANET …
based routing mechanism for mitigation of packet drop attacks in MANET …
Integration of Multi-Class Service Paradigm With Generic Trust Mechanism for Innovation, Customization and Adaptability in MANETs
Trust-based mechanisms are widely used in wireless networks of different kinds for
providing security against attack. Trust mechanism provides security from various attacks …
providing security against attack. Trust mechanism provides security from various attacks …
A Skellam Distribution Inspired Trust Factor-Based Selfish Node Detection Technique in MANETs
M Deva Priya, A Christy Jeba Malar, J Sengathir… - Proceedings of 6th …, 2021 - Springer
The trust of nodes in Mobile Ad hoc NETwork (MANET) is the potential factor that needs to
be investigated for facilitating predominant network performance. The network performance …
be investigated for facilitating predominant network performance. The network performance …
Energy Conscious Packet Transmission in Wireless Networks Using Trust Based Mechanism: A Cognitive Approach
The self-motivated nature of wireless ad-hoc networks deters the possibility of a centralized
solution. Also, no specific node can act as a centralized point due to energy and processing …
solution. Also, no specific node can act as a centralized point due to energy and processing …