ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Enhanced Energy Constraint Secure Routing Protocol for Clustered Randomly Distributed MANETs Using ADAM’s Algorithm
Mapping Intimacies
◽
10.1007/978-981-16-3728-5_66
◽
2021
◽
pp. 885-900
Author(s):
Bandani Anil Kumar
◽
Makam Venkata Subamanyam
◽
Kodati Satya Prasad
Keyword(s):
Routing Protocol
◽
Secure Routing
◽
Energy Constraint
◽
Secure Routing Protocol
Download Full-text
Related Documents
Cited By
References
A geographical-based secure routing protocol with lifetime optimization for wireless sensor networks
Information Science and Management Engineering
◽
10.2495/isme130891
◽
2013
◽
Author(s):
H.C. Zhang
◽
X. Wen
◽
D.H. Mo
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Routing Protocol
◽
Secure Routing
◽
Wireless Sensor
◽
Secure Routing Protocol
◽
Lifetime Optimization
Download Full-text
Performance Modelling of Secure Routing Protocol in Communication Network
International Journal of Computer Sciences and Engineering
◽
10.26438/ijcse/v6i11.242251
◽
2018
◽
Vol 6
(11)
◽
pp. 242-251
Author(s):
Mukesh Dixit
◽
Sarvottam Dixit
◽
Ajay Kumar Sachan
Keyword(s):
Communication Network
◽
Routing Protocol
◽
Secure Routing
◽
Performance Modelling
◽
Secure Routing Protocol
Download Full-text
Position-based secure routing protocol in Ad Hoc network
Journal of Computer Applications
◽
10.3724/sp.j.1087.2008.00568
◽
2008
◽
Vol 28
(3)
◽
pp. 568-571
Author(s):
Zhong-xian ZHANG
Keyword(s):
Routing Protocol
◽
Ad Hoc Network
◽
Ad Hoc
◽
Secure Routing
◽
Secure Routing Protocol
Download Full-text
An intrusion-tolerant secure routing protocol with key exchange for wireless sensor network
2008 International Conference on Information and Automation
◽
10.1109/icinfa.2008.4608249
◽
2008
◽
Cited By ~ 7
Author(s):
Jiliang Zhou
◽
Caixia Li
◽
Qiying Cao
◽
Yu Shen
Keyword(s):
Wireless Sensor Network
◽
Sensor Network
◽
Routing Protocol
◽
Key Exchange
◽
Secure Routing
◽
Wireless Sensor
◽
Secure Routing Protocol
◽
Intrusion Tolerant
Download Full-text
ADAPTIVE AND SECURE ROUTING PROTOCOL FOR EMERGENCY MOBILE AD HOC NETWORKS
International Journal of Wireless & Mobile Networks
◽
10.5121/ijwmn.2010.2205
◽
2010
◽
Vol 2
(2)
◽
pp. 62-78
◽
Cited By ~ 5
Author(s):
Emmanouil A. Panaousis
◽
Tipu A. Ramrekha
◽
Grant P. Millar
◽
Christos Politis
Keyword(s):
Ad Hoc Networks
◽
Mobile Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Secure Routing
◽
Secure Routing Protocol
◽
Mobile Ad Hoc
◽
Hoc Networks
Download Full-text
A Top-down Hierarchical Multi-hop Secure Routing Protocol for Wireless Sensor Networks
International Journal of Ad hoc Sensor & Ubiquitous Computing
◽
10.5121/ijasuc.2010.1204
◽
2010
◽
Vol 1
(2)
◽
pp. 33-52
◽
Cited By ~ 1
Author(s):
M. P. Singh
◽
Md. Zair Hussain
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Routing Protocol
◽
Secure Routing
◽
Wireless Sensor
◽
Top Down
◽
Secure Routing Protocol
Download Full-text
Identifying flaws in the secure routing protocol
Conference Proceedings of the 2003 IEEE International
◽
10.1109/pccc.2003.1203696
◽
2003
◽
Cited By ~ 14
Author(s):
J. Marshall
◽
V. Thakur
◽
A. Yasinsac
Keyword(s):
Routing Protocol
◽
Secure Routing
◽
Secure Routing Protocol
Download Full-text
An Energy Efficient Localization of the Sensory Nodes based on Secure Routing Protocol for Underwater Network
10.1109/gucon50781.2021.9573532
◽
2021
◽
Author(s):
Pushpendra R Verma
◽
Amit Kumar
◽
Rakesh Ranjan
Keyword(s):
Routing Protocol
◽
Energy Efficient
◽
Secure Routing
◽
Secure Routing Protocol
Download Full-text
A novel secure routing protocol of generation and management cryptographic keys for wireless sensor networks deployed in internet of things
International Journal of High Performance Computing and Networking
◽
10.1504/ijhpcn.2020.112693
◽
2020
◽
Vol 16
(2/3)
◽
pp. 87
◽
Cited By ~ 1
Author(s):
Wassim Jerbi
◽
Abderrahmen Guermazi
◽
Hafedh Trabelsi
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Internet Of Things
◽
Routing Protocol
◽
Secure Routing
◽
Wireless Sensor
◽
Secure Routing Protocol
◽
Cryptographic Keys
Download Full-text
ISSRP: A Secure Routing Protocol Using Identity-Based Signcryption Scheme in Ad-Hoc Networks
Parallel and Distributed Computing: Applications and Technologies - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30501-9_138
◽
2004
◽
pp. 711-714
◽
Cited By ~ 4
Author(s):
Bok-Nyong Park
◽
Jihoon Myung
◽
Wonjun Lee
Keyword(s):
Ad Hoc Networks
◽
Routing Protocol
◽
Ad Hoc
◽
Secure Routing
◽
Secure Routing Protocol
◽
Identity Based
◽
Hoc Networks
◽
Signcryption Scheme
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close