A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches
SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
exchange data. These “things” can be sensors, actuators, smartphones, wearables …
Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept
TK Saini, SC Sharma - Ad Hoc Networks, 2020 - Elsevier
Mobile ad hoc networks provide a promising opportunity for the applications requiring
instant networking in the resource constraint, multi-hop wireless environment. Routing …
instant networking in the resource constraint, multi-hop wireless environment. Routing …
A new method of mobile ad hoc network routing based on greed forwarding improvement strategy
DG Zhang, PZ Zhao, Y Cui, L Chen, T Zhang… - IEEE Access, 2019 - ieeexplore.ieee.org
In resource-constrained mobile ad hoc network, geographical routing algorithms are
relatively attractive routing algorithms. Due to the movement of nodes, energy exhaustion …
relatively attractive routing algorithms. Due to the movement of nodes, energy exhaustion …
A trust-based model for secure routing against RPL attacks in internet of things
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …
Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT
RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …
role in future Industrial Internet-of-Things communication, where smart devices will be …
A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns
J Liu, Z Liu, C Sun, J Zhuang - Journal of Artificial Intelligence and …, 2022 - ojs.istp-press.com
Wireless sensor networks (WSNs) have become increasingly popular due to the rapid
growth of the Internet of Things. As open wireless transmission media are easy to attack …
growth of the Internet of Things. As open wireless transmission media are easy to attack …
Performance analysis of routing protocols for UAV communication networks
X Tan, Z Zuo, S Su, X Guo, X Sun, D Jiang - IEEE access, 2020 - ieeexplore.ieee.org
The design of routing protocol is an important and key problem in unmanned aerial vehicle
(UAV) communication networks. In low altitude environment, UAV information transmission …
(UAV) communication networks. In low altitude environment, UAV information transmission …
An efficient trust-based scheme for secure and quality of service routing in MANETs
Due to the dynamism of topology, sharing of bandwidth and constraint of resources in
wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc …
wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc …
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …
working and vulnerability of underlined standard routing protocols is exposed to various …
Information-aware secure routing in wireless sensor networks
Q Shi, L Qin, Y Ding, B Xie, J Zheng, L Song - Sensors, 2019 - mdpi.com
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable
to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the …
to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the …