scholarly journals Algorithms for minimum-cost paths in time-dependent networks with waiting policies

Networks ◽  
2004 ◽  
Vol 44 (1) ◽  
pp. 41-46 ◽  
Author(s):  
Brian C. Dean
2019 ◽  
Vol 105 ◽  
pp. 102-117 ◽  
Author(s):  
Hamza Heni ◽  
Leandro C. Coelho ◽  
Jacques Renaud

1972 ◽  
Vol 6 (2) ◽  
pp. 131-136 ◽  
Author(s):  
Dennis Blumenfeld ◽  
Matthias Landau

2001 ◽  
Vol 52 (1) ◽  
pp. 102-108 ◽  
Author(s):  
Y-L Chen ◽  
D Rinks ◽  
K Tang

2016 ◽  
Vol 76 ◽  
pp. 32-40 ◽  
Author(s):  
Dakai Jin ◽  
Krishna S. Iyer ◽  
Cheng Chen ◽  
Eric A. Hoffman ◽  
Punam K. Saha

1968 ◽  
Vol 4 (2) ◽  
pp. 100-107 ◽  
Author(s):  
Peter Hart ◽  
Nils Nilsson ◽  
Bertram Raphael

2018 ◽  
Vol 7 (2.8) ◽  
pp. 134
Author(s):  
P Suma ◽  
Mohammed Ali Hussain

Mobile Ad-hoc Networks (MANETs) are wireless and nodes of it are mobile in nature. These networks can be adopted where equipment like wires cannot be established and the nodes are moving. Due to the mobile nature of nodes, a fixed topology cannot be achieved. This leads to a dynamic or ever changing network structure. The paths between the communicating nodes also change frequently. Overall monitoring system is absent in it i.e. supervising node is not present for establishing routes in the network. Each node itself acts as a router. Due to the lack of fundamental management system and ever moving nodes, security becomes a challenge and detection of attackers also becomes tough. Dynamic source Routing (DSR) is used in route discovery. In this routing strategy, paths are established only on demand of sender and receiver nodes. And to reduce the cost many algorithms were proposed, but the concept of security is deficit in them. In this paper, Secure and Effective Random Paths Selection (SERPS) algorithm is proposed with the concepts of minimum cost and node disjointness to achieve security. All the node disjoint paths between sender and receiver are found. Among them a minimum of 4 minimum cost paths are selected. Then data packets are sent through them by randomly selecting the paths. Care is to be taken such that no consecutive packets go through the same path. By this, attacker at any node gets only the random packets but not the complete data. In this way security can be achieved. The simulation for the proposed SERPS algorithm is done to show the routing process.


Author(s):  
Gianlorenzo D' ◽  
N.A. Angelo ◽  
Daniele Frigioni ◽  
Vinicio Maurizio

Sign in / Sign up

Export Citation Format

Share Document