Academic literature on the topic 'Secure Routing algorithm'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Routing algorithm.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Secure Routing algorithm"

1

V.Sadafal, Poonam, and R. H. Borhade. "Secure Routing using Clustering Algorithm." International Journal of Computer Applications 84, no. 9 (2013): 23–25. http://dx.doi.org/10.5120/14605-2854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Goumidi, Mohammed Abdessamad Zigh Ehlem Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555–63. https://doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.

Full text
Abstract:
In this paper, we aimed to develop a trusted secured routing Ad-hoc on-demand distance vector (AODV) protocol to fight against blackhole attacks within the wireless body area network (WBAN). The trusted secure routing protocol incorporates a routing strategy based on trust value to detect malicious nodes based on their trust value, a routing technique based on node residual energy to select the node with the highest residual energy during the communication process, and a hybrid cryptography algorithm that merges the Affine cipher with the modified RSA cipher algorithm to secure communication a
APA, Harvard, Vancouver, ISO, and other styles
3

Sivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.

Full text
Abstract:
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is compute
APA, Harvard, Vancouver, ISO, and other styles
4

D.Sivamurugan and L.Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research - Granthaalayah 5, no. 4 (2017): 83–91. https://doi.org/10.5281/zenodo.569982.

Full text
Abstract:
Mobile ad hoc network (MANET) is a group of mobile nodes that communicates with each other without any supporting infrastructure. These networks have some unique features such as dynamic mobility, open nature, lack of infrastructure, limited physical security and they are vulnerable to several security threats. Malicious node can drop all or partial received packets instead of forwarding them to the next hop through the path. In order to find the malicious nodes, an initial transmission is made between the source and destination nodes. Using fuzzy rules, the trust value of each node is compute
APA, Harvard, Vancouver, ISO, and other styles
5

Abdessamad, Goumidi Mohammed, Zigh Ehlem, and Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.

Full text
Abstract:
<p>In this paper, we aimed to develop a trusted secured routing Ad-hoc on-demand distance vector (AODV) protocol to fight against blackhole attacks within the wireless body area network (WBAN). The trusted secure routing protocol incorporates a routing strategy based on trust value to detect malicious nodes based on their trust value, a routing technique based on node residual energy to select the node with the highest residual energy during the communication process, and a hybrid cryptography algorithm that merges the Affine cipher with the modified RSA cipher algorithm to secure commun
APA, Harvard, Vancouver, ISO, and other styles
6

Wang, Bin, ChunMing Wu, Qiang Yang, Pan Lai, JuLong Lan, and YunFei Guo. "A secure routing model based on distance vector routing algorithm." Science China Information Sciences 57, no. 1 (2012): 1–13. http://dx.doi.org/10.1007/s11432-012-4659-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Sadoon, Maha, and Ahmed Jedidi. "A secure trust-based protocol for hierarchical routing in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 3838. http://dx.doi.org/10.11591/ijece.v12i4.pp3838-3849.

Full text
Abstract:
<p><span>Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides sec
APA, Harvard, Vancouver, ISO, and other styles
8

Maha, Al-Sadoon, and Jedidi Ahmed. "A secure trust-based protocol for hierarchical routing in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 3838–49. https://doi.org/10.11591/ijece.v12i4.pp3838-3849.

Full text
Abstract:
Wireless sensor networks (WSNs) became the backbone of the internet of things (IoT). IoT applications are vital and demand specific quality of service (QoS) requirements. In addition, security has become a primary concern to provide secure communication between wireless nodes, with additional challenges related to the node’s computational resources. Particular, the design of secure and resource efficient routing protocol is a critical issue in the current deployment of WSNs. Therefore, this paper proposes a novel secure-trust aware routing protocol (ST2A) that provides secure and reliabl
APA, Harvard, Vancouver, ISO, and other styles
9

Ebrahimi Basabi, Alireza. "Secure Routing in IoT with Evolutionary Algorithm." Journal of Advances in Computer Networks 7, no. 2 (2019): 44–47. http://dx.doi.org/10.18178/jacn.2019.7.2.270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Panda, Niranjan, and Pankajini Panda. "A secure and energy efficient ant routing algorithm." Intelligent Decision Technologies 14, no. 3 (2020): 325–36. http://dx.doi.org/10.3233/idt-190042.

Full text
Abstract:
In Mobile Ad hoc Networks (MANETs), setting up an ideal and proficient route linking the conveying bodies is the essential objective of the routing protocols. But any assault during the routing stage may upset the communication, paralyzing the whole network. So, providing security in routing for a protected communication between nodes has become a prime concern. In the present study, we propose a Secure Energy Efficient Ant Routing Algorithm (SEEARA) based on Ant Colony Optimization (ACO) algorithm and cryptographic primitives that exercises on power control and secure routing between a pair o
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Secure Routing algorithm"

1

Hashem, Eiza Mahmoud. "Secure multi-constrained QoS reliable routing algorithm for vehicular ad hoc networks (VANETs)." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/10204.

Full text
Abstract:
Vehicular Ad hoc Networks (VANETs) are a particular form of wireless network made by vehicles communicating among themselves and with roadside base stations. A wide range of services has been developed for VANETs ranging from safety to infotainment applications. A key requirement for such services is that they are offered with Quality of Service (QoS) guarantees in terms of service reliability and availability. Furthermore, due to the openness of VANET’s wireless channels to both internal and external attacks, the application of security mechanisms is mandatory to protect the offered QoS guara
APA, Harvard, Vancouver, ISO, and other styles
2

Simaremare, Harris. "A development of secure and optimized AODV routing protocol using ant algorithm." Thesis, Mulhouse, 2013. http://www.theses.fr/2013MULH6753/document.

Full text
Abstract:
Les réseaux sans fil sont devenus une technologie importante dans le secteur des télécommunications. L'une des principales technologies des réseaux sans fil sont les réseaux mobiles ad hoc (MANET). MANET est un système d'auto-configuration (autonome) des routeurs mobiles où les routeurs sont libres de se déplacer de façon aléatoire et de s'organiser arbitrairement. La topologie des réseaux sans fil peut alors changer rapidement et de manière imprévisible avec une grande mobilité et sans aucune infrastructure fixe et sans administration centrale. Les protocoles de routage MANET sont Ad Hoc on D
APA, Harvard, Vancouver, ISO, and other styles
3

Ellinidou, Soultana. "Protocols and algorithms for secure Software Defined Network on Chip (SDNoC)." Doctoral thesis, Universite Libre de Bruxelles, 2021. https://dipot.ulb.ac.be/dspace/bitstream/2013/319257/5/ContratSE.pdf.

Full text
Abstract:
Under the umbrella of Internet of Things (IoT) and Internet of Everything (IoE), new applications with diverse requirements have emerged and the traditional System-on-Chips (SoCs) were unable to support them. Hence, new versatile SoC architectures were designed, like chiplets and Cloud-of-Chips (CoC). A key component of every SoC, is the on-chip interconnect technology, which is responsible for the communication between Processing Elements (PEs) of a system. Network-on-Chip (NoC) is the current widely used interconnect technology, which is a layered, scalable approach. However, the last years
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Secure Routing algorithm"

1

K, Kokula Krishna Hari, ed. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Association of Scientists, Developers and Faculties, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Secure Routing algorithm"

1

Shi, Shudong. "A Secure Routing Algorithm for MANET." In Advances in Computation and Intelligence. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04843-2_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hamidouche, Ranida, Zibouda Aliouat, and Abdelhak Gueroui. "Low Energy-Efficient Clustering and Routing Based on Genetic Algorithm in WSNs." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03101-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Shu-Yuan, Theodore Brown, and Hsien-Tseng Wang. "A Reaction-Diffusion and Gür Game Based Routing Algorithm for Wireless Sensor Networks." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67550-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bindra, Sandeep Singh, and Alankrita Aggarwal. "Secure and intelligent routing for CPS using trust-based optimization algorithm." In Artificial Intelligence and Information Technologies. CRC Press, 2024. http://dx.doi.org/10.1201/9781032700502-56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bounceur, Ahcène, Madani Bezoui, Loic Lagadec, Reinhardt Euler, Laouid Abdelkader, and Mohammad Hammoudeh. "DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03101-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Shanthi, H. J., and E. A. Mary Anita. "Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs." In Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’). Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30348-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ravi Kiran Varma, P., Bura Vijay Kumar, K. L. Hemalatha, Muhammed Basim Jabar, and B. M. Manjula. "Secure Clustering and Routing Based on Modified Whale Optimization Algorithm in MANET." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-7876-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prashanth, M. N., and Annapurna P. Patil. "Implementation of a Secure and Efficient Routing Algorithm for Vehicular Ad Hoc Networks." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8240-5_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Naga Raju, M., G. Sunil, Zainab Abed Almoussawi, P. Ravi Kiran Varma, and Subhra Chakraborty. "Improved Whale Optimization Algorithm Based Energy Efficient Secure Routing in Mobile Wireless Sensor Networks." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-7876-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kumar, Bandani Anil, Makam Venkata Subamanyam, and Kodati Satya Prasad. "An Enhanced Energy Constraint Secure Routing Protocol for Clustered Randomly Distributed MANETs Using ADAM’s Algorithm." In Computer Networks and Inventive Communication Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3728-5_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Secure Routing algorithm"

1

Muruganandam, S., S.Gnanavel, K.E.Narayana, M.Jaeyalakshmi, and K. Antony Kumar. "Hybrid Algorithm for Secure Routing in MANET Using Cryptographic Applications." In 2024 International Conference on Electronic Systems and Intelligent Computing (ICESIC). IEEE, 2024. https://doi.org/10.1109/icesic61777.2024.10846551.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cao, Qundan, and Xiuwu Yu. "WSN Secure Routing Protocol Based on an Improved WOA Algorithm." In 2024 4th International Conference on Electronic Information Engineering and Computer (EIECT). IEEE, 2024. https://doi.org/10.1109/eiect64462.2024.10866046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Kaijun, Bo Tian, and Xue Wang. "A Secure Routing Method by Neural Combination Optimization Decision Algorithm Based on Overlay Network." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mallikarjuna, Shruthi Bennur, and Channakrishna Raju. "Similarity Preference Weight Based Chimp Optimization Algorithm for Secure Clustering and Routing in IoT." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872084.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kalaivani, R., K. Aruna, S. Tamilarasan, and J. Jayapriya. "Pelican Optimization Algorithm for Mobile Secure Routing in Intrusion Detection Systesm in Wireless Sensor Networks." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10690985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nara, Nalini, Raja Sekhar C, Tagore Sai Prasad G, Sireesha N, and Madhavilatha Idimadakala. "A Comprehensive Study of Secure Clustering and Routing for MANET using Fuzzy Clustering and Optimization Algorithm." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2025. https://doi.org/10.1109/icdcece65353.2025.11034888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

M, Asha Rani, and Roopashree H. R. "Robust Wireless Sensor Network using Enhanced Trust-Based Secure and Energy-Efficient Routing Algorithm (ETBSEER) to Prevent Malicious Nodes." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

N, Deepak B., Mallanagouda Biradar, Vijayalaxmi Joshi, and Krunal B. Pawar. "Reliable and Secured Cluster Based Routing in WSN via Lyrebird-Panda Optimization Algorithm." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10859367.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ping Li, Jin Zhang, and Ya-ping Lin. "Multipath-Based Secure Routing Algorithm for Sensor Network." In 2006 6th World Congress on Intelligent Control and Automation. IEEE, 2006. http://dx.doi.org/10.1109/wcica.2006.1713152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cheng, Fen-hua, Jin Zhang, and Zheng Ma. "Curve-Based Secure Routing Algorithm for Sensor Network." In 2006 International Conference on Intelligent Information Hiding and Multimedia. IEEE, 2006. http://dx.doi.org/10.1109/iih-msp.2006.264998.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Secure Routing algorithm"

1

Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.

Full text
Abstract:
Abstract: As quantum computing and quantum communication technologies advance, securing quantum networks against emerging cyber threats has become a critical challenge. Traditional cryptographic methods are vulnerable to quantum attacks, necessitating the development of AI-driven security solutions. This research explores the integration of machine learning (ML) algorithms with quantum cryptographic frameworks to enhance Quantum Key Distribution (QKD), post-quantum cryptography (PQC), and real-time threat detection. AI-powered quantum security mechanisms, including neural network-based quantum
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!