iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1155/2021/5521713
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,19]],"date-time":"2024-11-19T18:20:47Z","timestamp":1732040447102},"reference-count":29,"publisher":"Hindawi Limited","license":[{"start":{"date-parts":[[2021,4,21]],"date-time":"2021-04-21T00:00:00Z","timestamp":1618963200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,4,21]]},"abstract":"Mobile ad hoc network (MANET) is a miscellany of versatile nodes that communicate without any fixed physical framework. MANETs gained popularity due to various notable features like dynamic topology, rapid setup, multihop data transmission, and so on. These prominent features make MANETs suitable for many real-time applications like environmental monitoring, disaster management, and covert and combat operations. Moreover, MANETs can also be integrated with emerging technologies like cloud computing, IoT, and machine learning algorithms to achieve the vision of Industry 4.0. All MANET-based sensitive real-time applications require secure and reliable data transmission that must meet the required QoS. In MANET, achieving secure and energy-efficient data transmission is a challenging task. To accomplish such challenging objectives, it is necessary to design a secure routing protocol that enhances the MANET\u2019s QoS. In this paper, we proposed a trust-based multipath routing protocol called TBSMR to enhance the MANET\u2019s overall performance. The main strength of the proposed protocol is that it considers multiple factors like congestion control, packet loss reduction, malicious node detection, and secure data transmission to intensify the MANET\u2019s QoS. The performance of the proposed protocol is analyzed through the simulation in NS2. Our simulation results justify that the proposed routing protocol exhibits superior performance than the existing approaches.<\/jats:p>","DOI":"10.1155\/2021\/5521713","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T01:12:45Z","timestamp":1619053965000},"page":"1-9","source":"Crossref","is-referenced-by-count":47,"title":["TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network"],"prefix":"10.1155","volume":"2021","author":[{"given":"Mohammad","family":"Sirajuddin","sequence":"first","affiliation":[{"name":"Department of C. S. E., KHIT, JNTUK, Kakinada 522019, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7162-8909","authenticated-orcid":true,"given":"Ch.","family":"Rupa","sequence":"additional","affiliation":[{"name":"Department of C. S. E., V. R. Siddhartha Engineering College, Vijayawada 520007, India"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-4350-3911","authenticated-orcid":true,"given":"Celestine","family":"Iwendi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Coal City University, Enugu 400231, Nigeria"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3571-0347","authenticated-orcid":true,"given":"Cresantus","family":"Biamba","sequence":"additional","affiliation":[{"name":"Department of Educational Sciences, Faculty of Education and Business Studies, University of Gavle, 80176 Gavle, Sweden"}]}],"member":"98","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-81-322-2755-7_28"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06202-7"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2783682"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICRITO48877.2020.9198036"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-017-1625-8"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1504\/ijmndi.2016.078999"},{"key":"7","first-page":"1","article-title":"Detecting Black hole attack by selecting appropriate routes for authentic message passing using SHA-3 and Diffie-Hellman algorithm in AODV and AOMDV routing protocols in MANET","author":"S. Hossain"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06724-0"},{"key":"9","first-page":"1","article-title":"Secure routing protocols for mobile ad hoc networks","author":"H. Moudni"},{"key":"10","first-page":"28","article-title":"Security challenges and attacks in dynamic mobile ad hoc networks MANETs","author":"F. Abdel-Fattah"},{"key":"11","first-page":"1","article-title":"Performance analysis of MANET routing protocols by varying mobility, speed and network load","author":"N. Sarmah"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102331"},{"key":"13","first-page":"294","article-title":"QAODV: A flood control ad-hoc on demand distance vector routing protocol","author":"Bhagyalakshmi"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.08.013"},{"key":"15","first-page":"0527","article-title":"Design and implementation of an efficient mul- tipath AODV routing algorithm for MANETs","author":"H. Jhajj"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30111-7_4"},{"key":"17","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1109\/GCIS.2009.203","article-title":"Modified energy-aware AODV routing for ad hoc networks","author":"Z. Zhaoxiao","year":"2009","journal-title":"WRI Global Congress on Intelligent Systems"},{"key":"18","first-page":"881","article-title":"Network-based anomaly intrusion detection system in MANETS","author":"M. S. Hussain"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.18280\/ama_b.610104"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6319-0_15"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048077"},{"key":"22","article-title":"Towards secure data fusion in industrial IoT using transfer learning","volume":"2020","author":"H. Lin","year":"2020","journal-title":"Institute of Electrical and Electronics Engineers Transactions on Industrial Informatics"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1155\/2018\/1728303","article-title":"Use of data visualisation for zero-day malware detection","volume":"2018","author":"S. Venkatraman","year":"2018","journal-title":"Security and Communication Networks"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107138"},{"key":"25","article-title":"Fusion of federated learning and industrial internet of things: a survey","author":"Q. V. Pham","year":"2021"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.3013013"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2012.0610"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.3390\/s20092559"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3997"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5521713.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5521713.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/5521713.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T01:12:50Z","timestamp":1619053970000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/5521713\/"}},"subtitle":[],"editor":[{"given":"Muhammad","family":"Shafiq","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,4,21]]},"references-count":29,"alternative-id":["5521713","5521713"],"URL":"https:\/\/doi.org\/10.1155\/2021\/5521713","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2021,4,21]]}}}