Trust Based Power Aware Secure Source Routing Protocol using Fuzzy Logic for Mobile Adhoc Networks
Texto
Imagem
Documentos relacionados
The best possible outcomes obtained from the above proposed fuzzy logic based protocol helps a mobile Ad- Hoc network to choose an efficient edge on the basis of
Source peer s, once gathering swarm agent RCSA, updates the secretion table with the pheromone indicator value g ni of every relay hope peer ni which
Topology Based routing approach has Route instability, this is because an established route consists of a set of nodes between the source and the destination that are affected
The proposed work aims at discovering an efficient energy aware routing scheme in MANETs that not only uses the node energy effectively but also finds the best route
The best possible outcomes obtained from the above proposed fuzzy logic based protocol helps a mobile Ad- Hoc network to choose an efficient edge on the basis of
Earlier on-demand routing protocols[3,4,5,6,7] were based on flooding the routing packets in all directions irrespective of the location of the destination node, resulting
Throughout , a discussion of existing mobile ad hoc networks' routing protocols’ types and their advantages and disadvantages was given and a list of existing proactive, reactive and
In Case 1, i,e., for high level of security ( sec_ level = 1), during routing process, the source and destination nodes separately verify the authenticity of all other nodes in