KEY OPTIMIZATION TECHNIQUE IN MOBILE AD HOC NETWORKS
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
P. Jacquet, P. Minet, P. Muhlethaler, N. Rivierre. Increasing reliability in cable free radio LANs: Low level forwarding in HIPERLAN. Wireless Personal Communications, 1996.
Qayyum, L. Viennot, A. Laouiti. Multipoint relaying: An efficient technique for flooding in mobile wireless networks. 35th Annual Hawaii International Conference on System Sciences (HICSS'2001).
www.ietf.org/rfc/rfc3626.
Kaveh, "Particle Swarm Optimization", Advances in Metaheuristic Algorithms for Optimal Design of Structures, pp. 11-43, 2016.
Glover F, Kochenberger GA (eds) (2003) Handbook of metaheuristics. Kluwer Academic Publishers, Dordrecht
Kennedy J, Eberhart R (1995) Particle swarm optimization. In: Proceedings of IEEE international conference on neural networks, vol 4, pp 1942–1948
Shi Y, Eberhart R (1998) A modified particle swarm optimizer. In: Proceedings of IEEE World congress on computational intelligence. In: The 1998 I.E. international conference on evolutionary computation
Eesti Infotehnoloogia Kolledz Diffie-Hellman key exchange Essay Sandra Netsajeva Tallinn 2009.
Tan, S., Li, X. and Dong, Q. (2015) ‘Trust based routing mechanism for securing OSLR-based MANET’, Ad Hoc Networks, vol. 30, pp. 84-98.
Sarkar, S. and Datta, R., 2016. A game theoretic framework for stochastic multipath routing in self-organized MANETs. Pervasive and Mobile Computing.pp.1-18
Zhang, M., Yang, M., Wu, Q., Zheng, R. and Zhu, J., 2017. Smart perception and autonomic optimization: A novel bio-inspired hybrid routing protocol for MANETs. Future Generation Computer Systems,pp.1-18.
Boushaba, A., Benabbou, A., Benabbou, R., Zahi, A. and Oumsis, M., 2015. Multi-point relay selection strategies to reduce topology control traffic for OLSR protocol in MANETs. Journal of Network and Computer Applications, Vol.53, pp.91-102.
Kanarachos, S., Griffin, J. and Fitzpatrick, M.E., 2017. Efficient trust optimization using the contrast-based fruit fly optimization algorithm. Computers & Structures, Vol.182, pp.137-148.
Govindan Shanthi, Meenakshi Sundaram Ganaga Durga Cognitive-based routing model with identity-based cryptography in MANET Int. J. Mobile Network Design and Innovation, Vol. X, No. Y, 200x (forthcoming inderscience publications)
G. Shanthi, M. Ganaga Durga Secure and Trusted Optimal Routing Model Using Fruit Fly Optimization for Cognitive Radio Based MANET, International Journal of Pure and Applied Mathematics Volume 118 No. 7 2018, 605-614 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version)