Strengthening the mobile ad hoc networks using enhanced self- detection routing scheme (Record no. 19054)
[ view plain ]
| 000 -LEADER | |
|---|---|
| fixed length control field | a |
| 003 - CONTROL NUMBER IDENTIFIER | |
| control field | OSt |
| 005 - DATE AND TIME OF LATEST TRANSACTION | |
| control field | 20230327140325.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
| fixed length control field | 230327b xxu||||| |||| 00| 0 eng d |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | AIKTC-KRRC |
| Transcribing agency | AIKTC-KRRC |
| 100 ## - MAIN ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 17904 |
| Author | Mahamune, Ankita A. |
| 245 ## - TITLE STATEMENT | |
| Title | Strengthening the mobile ad hoc networks using enhanced self- detection routing scheme |
| 250 ## - EDITION STATEMENT | |
| Volume, Issue number | Vol.13(3), Sep |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Chennai |
| Name of publisher, distributor, etc. | ICT Academy |
| Year | 2022 |
| 300 ## - PHYSICAL DESCRIPTION | |
| Pagination | 2753-2762p. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Reliable routing in Mobile Ad hoc NETwork (MANET) depends on<br/>individual node cooperation. The entire network performance may<br/>degrade because of even a single misbehaving node participating as an<br/>intermediate node. Thus, there is a need for incorporating secure<br/>routing with MANET to successfully operate in an adverse<br/>environment where routing security threats are employed. Looking at<br/>a few of the unsuccessful attempts by state-of-the-art routing schemes<br/>at certain applications, this paper proposes a trust-based secure routing<br/>termed as Enhanced Self-Detection Routing Scheme (ESDRS). This<br/>proposed scheme incorporates a self-detection procedure into a<br/>standard dynamic routing protocol Ad hoc On-Demand Distance<br/>Vector (AODV), finally resulting in detection and reaction to malicious<br/>nodes in MANET. The validation of the proposed approach is carried<br/>out through a comparative performance analysis with the recent<br/>Evolutionary Self-Cooperative Trust (ESCT) scheme and the standard<br/>AODV. The comparison is based on computations of Packet Delivery<br/>Ratio (PDR), delay, throughput, jitter, number of dropped data packets,<br/>Probability of Detection (PoD) of malicious and benevolent behavior,<br/>and normalized routing overhead while varying the number of nodes,<br/>the number of attackers, and node speed. Simulation results affirm that<br/>the proposed scheme improves the metric values as compared to the<br/>other routing schemes. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| 9 (RLIN) | 4619 |
| Topical term or geographic name entry element | EXTC Engineering |
| 700 ## - ADDED ENTRY--PERSONAL NAME | |
| 9 (RLIN) | 17905 |
| Co-Author | Chandane, M. M. |
| 773 0# - HOST ITEM ENTRY | |
| International Standard Serial Number | 0976-0091 |
| Place, publisher, and date of publication | Chennai ICT Academy |
| Title | ICTACT journal on communication technology |
| 856 ## - ELECTRONIC LOCATION AND ACCESS | |
| URL | https://ictactjournals.in/paper/IJCT_Vol_13_Iss_3_Paper_6_2753_2762.pdf |
| Link text | Click here |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
| Source of classification or shelving scheme | Dewey Decimal Classification |
| Koha item type | Articles Abstract Database |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total Checkouts | Barcode | Date last seen | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | School of Engineering & Technology | School of Engineering & Technology | Archieval Section | 27/03/2023 | 2023-0525 | 27/03/2023 | 27/03/2023 | Articles Abstract Database |