A comprehensive review on secure routing in internet of things: Mitigation methods and trust-based approaches

SM Muzammal, RK Murugesan… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) is a network of “things,” connected via Internet, to collect and
exchange data. These “things” can be sensors, actuators, smartphones, wearables …

Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept

TK Saini, SC Sharma - Ad Hoc Networks, 2020 - Elsevier
Mobile ad hoc networks provide a promising opportunity for the applications requiring
instant networking in the resource constraint, multi-hop wireless environment. Routing …

A new method of mobile ad hoc network routing based on greed forwarding improvement strategy

DG Zhang, PZ Zhao, Y Cui, L Chen, T Zhang… - IEEE Access, 2019 - ieeexplore.ieee.org
In resource-constrained mobile ad hoc network, geographical routing algorithms are
relatively attractive routing algorithms. Due to the movement of nodes, energy exhaustion …

A trust-based model for secure routing against RPL attacks in internet of things

SM Muzammal, RK Murugesan, NZ Jhanjhi… - Sensors, 2022 - mdpi.com
In IoT networks, the de facto Routing Protocol for Low Power and Lossy Networks (RPL) is
vulnerable to various attacks. Routing attacks in RPL-based IoT are becoming critical with …

Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT

RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …

A data transmission approach based on ant colony optimization and threshold proxy re-encryption in wsns

J Liu, Z Liu, C Sun, J Zhuang - Journal of Artificial Intelligence and …, 2022 - ojs.istp-press.com
Wireless sensor networks (WSNs) have become increasingly popular due to the rapid
growth of the Internet of Things. As open wireless transmission media are easy to attack …

Performance analysis of routing protocols for UAV communication networks

X Tan, Z Zuo, S Su, X Guo, X Sun, D Jiang - IEEE access, 2020 - ieeexplore.ieee.org
The design of routing protocol is an important and key problem in unmanned aerial vehicle
(UAV) communication networks. In low altitude environment, UAV information transmission …

An efficient trust-based scheme for secure and quality of service routing in MANETs

MS Pathan, N Zhu, J He, ZA Zardari, MQ Memon… - Future Internet, 2018 - mdpi.com
Due to the dynamism of topology, sharing of bandwidth and constraint of resources in
wireless nodes, the provision of quality of service (QoS) for routing in mobile ad hoc …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Information-aware secure routing in wireless sensor networks

Q Shi, L Qin, Y Ding, B Xie, J Zheng, L Song - Sensors, 2019 - mdpi.com
Secure routing is crucial for wireless sensor networks (WSNs) because they are vulnerable
to various attacks. In this paper, we propose a new secure routing protocol for WSNs in the …