Please use this identifier to cite or link to this item: http://ir.lib.seu.ac.lk/handle/123456789/6036
Full metadata record
DC FieldValueLanguage
dc.contributor.authorHemalatha, S.-
dc.contributor.authorKshirsagar, Pravin R.-
dc.contributor.authorManoharan, Hariprasath-
dc.contributor.authorGowri, N. Vasantha-
dc.contributor.authorVani, A.-
dc.contributor.authorQaiyum, Sana-
dc.contributor.authorVijayakumar, P.-
dc.contributor.authorTirth, Vineet-
dc.contributor.authorAbdul Haleem, Sulaima Lebbe-
dc.contributor.authorChakrabarti, Prasun-
dc.contributor.authorTeressa, Dawit Mamiru-
dc.date.accessioned2022-05-09T06:28:52Z-
dc.date.available2022-05-09T06:28:52Z-
dc.date.issued2022-05-06-
dc.identifier.citationWireless Communications and Mobile Computing, 2022en_US
dc.identifier.issn1530-8669-
dc.identifier.uri10.1155/2022/6776378-
dc.identifier.urihttp://ir.lib.seu.ac.lk/handle/123456789/6036-
dc.description.abstractMobile network nodes are trustworthy nodes; the data access in transmitting and receiving the data packet is not efficient in different network procedures. The malicious nodes are available in routing path making the packet loss, in packet transmission for time instance. Since the regular mobile network must not verify every mobile node approved else illegal, subsequently the reserved level of nodes also was not considered, to injure the packet transmission procedure by link failure called connection loss. It minimizes the transmission rate and network lifetime and improves packet latency and energy usage. The proposed novel link establishment communication (NLEC) technique is used to find the dependable routing path against intruder node available in the network. This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. Lower trust level node is selfish node and they are detected and ignored from path. It increases the lifespan of network and throughput and minimizes the end to end delay and energy consumption.en_US
dc.language.isoen_USen_US
dc.publisherHindawi, Wileyen_US
dc.subjectMobile networken_US
dc.subjectTransmittingen_US
dc.subjectTransmissionen_US
dc.subjectCommunication.en_US
dc.titleNovel link establishment communication scheme against selfish attack using node reward with trust level evaluation algorithm in MANETen_US
dc.typeArticleen_US
Appears in Collections:Research Articles

Files in This Item:
File Description SizeFormat 
6776378.pdf1.72 MBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.