Strengthening the mobile ad hoc networks using enhanced self- detection routing scheme (Record no. 19054)

MARC details
000 -LEADER
fixed length control field a
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230327140325.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230327b xxu||||| |||| 00| 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency AIKTC-KRRC
Transcribing agency AIKTC-KRRC
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 17904
Author Mahamune, Ankita A.
245 ## - TITLE STATEMENT
Title Strengthening the mobile ad hoc networks using enhanced self- detection routing scheme
250 ## - EDITION STATEMENT
Volume, Issue number Vol.13(3), Sep
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Chennai
Name of publisher, distributor, etc. ICT Academy
Year 2022
300 ## - PHYSICAL DESCRIPTION
Pagination 2753-2762p.
520 ## - SUMMARY, ETC.
Summary, etc. Reliable routing in Mobile Ad hoc NETwork (MANET) depends on<br/>individual node cooperation. The entire network performance may<br/>degrade because of even a single misbehaving node participating as an<br/>intermediate node. Thus, there is a need for incorporating secure<br/>routing with MANET to successfully operate in an adverse<br/>environment where routing security threats are employed. Looking at<br/>a few of the unsuccessful attempts by state-of-the-art routing schemes<br/>at certain applications, this paper proposes a trust-based secure routing<br/>termed as Enhanced Self-Detection Routing Scheme (ESDRS). This<br/>proposed scheme incorporates a self-detection procedure into a<br/>standard dynamic routing protocol Ad hoc On-Demand Distance<br/>Vector (AODV), finally resulting in detection and reaction to malicious<br/>nodes in MANET. The validation of the proposed approach is carried<br/>out through a comparative performance analysis with the recent<br/>Evolutionary Self-Cooperative Trust (ESCT) scheme and the standard<br/>AODV. The comparison is based on computations of Packet Delivery<br/>Ratio (PDR), delay, throughput, jitter, number of dropped data packets,<br/>Probability of Detection (PoD) of malicious and benevolent behavior,<br/>and normalized routing overhead while varying the number of nodes,<br/>the number of attackers, and node speed. Simulation results affirm that<br/>the proposed scheme improves the metric values as compared to the<br/>other routing schemes.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 4619
Topical term or geographic name entry element EXTC Engineering
700 ## - ADDED ENTRY--PERSONAL NAME
9 (RLIN) 17905
Co-Author Chandane, M. M.
773 0# - HOST ITEM ENTRY
International Standard Serial Number 0976-0091
Place, publisher, and date of publication Chennai ICT Academy
Title ICTACT journal on communication technology
856 ## - ELECTRONIC LOCATION AND ACCESS
URL https://ictactjournals.in/paper/IJCT_Vol_13_Iss_3_Paper_6_2753_2762.pdf
Link text Click here
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Articles Abstract Database
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     School of Engineering & Technology School of Engineering & Technology Archieval Section 27/03/2023   2023-0525 27/03/2023 27/03/2023 Articles Abstract Database
Unique Visitors hit counter Total Page Views free counter
Implemented and Maintained by AIKTC-KRRC (Central Library).
For any Suggestions/Query Contact to library or Email: librarian@aiktc.ac.in | Ph:+91 22 27481247
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.