Academic literature on the topic 'Secure Routing algorithm'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Secure Routing algorithm.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Secure Routing algorithm"
V.Sadafal, Poonam, and R. H. Borhade. "Secure Routing using Clustering Algorithm." International Journal of Computer Applications 84, no. 9 (2013): 23–25. http://dx.doi.org/10.5120/14605-2854.
Full textGoumidi, Mohammed Abdessamad Zigh Ehlem Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555–63. https://doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.
Full textSivamurugan, D., and L. Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research -GRANTHAALAYAH 5, no. 4 (2017): 83–91. http://dx.doi.org/10.29121/granthaalayah.v5.i4.2017.1798.
Full textD.Sivamurugan and L.Raja. "SECURE ROUTING IN MANET USING HYBRID CRYPTOGRAPHY." International Journal of Research - Granthaalayah 5, no. 4 (2017): 83–91. https://doi.org/10.5281/zenodo.569982.
Full textAbdessamad, Goumidi Mohammed, Zigh Ehlem, and Ali-Pacha Adda Belkacem. "Mitigating blackhole attacks in wireless body area network." Indonesian Journal of Electrical Engineering and Computer Science 36, no. 3 (2024): 1555. http://dx.doi.org/10.11591/ijeecs.v36.i3.pp1555-1563.
Full textWang, Bin, ChunMing Wu, Qiang Yang, Pan Lai, JuLong Lan, and YunFei Guo. "A secure routing model based on distance vector routing algorithm." Science China Information Sciences 57, no. 1 (2012): 1–13. http://dx.doi.org/10.1007/s11432-012-4659-7.
Full textAl-Sadoon, Maha, and Ahmed Jedidi. "A secure trust-based protocol for hierarchical routing in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 3838. http://dx.doi.org/10.11591/ijece.v12i4.pp3838-3849.
Full textMaha, Al-Sadoon, and Jedidi Ahmed. "A secure trust-based protocol for hierarchical routing in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 4 (2022): 3838–49. https://doi.org/10.11591/ijece.v12i4.pp3838-3849.
Full textEbrahimi Basabi, Alireza. "Secure Routing in IoT with Evolutionary Algorithm." Journal of Advances in Computer Networks 7, no. 2 (2019): 44–47. http://dx.doi.org/10.18178/jacn.2019.7.2.270.
Full textPanda, Niranjan, and Pankajini Panda. "A secure and energy efficient ant routing algorithm." Intelligent Decision Technologies 14, no. 3 (2020): 325–36. http://dx.doi.org/10.3233/idt-190042.
Full textDissertations / Theses on the topic "Secure Routing algorithm"
Hashem, Eiza Mahmoud. "Secure multi-constrained QoS reliable routing algorithm for vehicular ad hoc networks (VANETs)." Thesis, Brunel University, 2014. http://bura.brunel.ac.uk/handle/2438/10204.
Full textSimaremare, Harris. "A development of secure and optimized AODV routing protocol using ant algorithm." Thesis, Mulhouse, 2013. http://www.theses.fr/2013MULH6753/document.
Full textEllinidou, Soultana. "Protocols and algorithms for secure Software Defined Network on Chip (SDNoC)." Doctoral thesis, Universite Libre de Bruxelles, 2021. https://dipot.ulb.ac.be/dspace/bitstream/2013/319257/5/ContratSE.pdf.
Full textBooks on the topic "Secure Routing algorithm"
K, Kokula Krishna Hari, ed. Secure Data Transmission through Trusted Node in Mantes using AODV Routing Algorithm: SATEM: ICCS 2014. Association of Scientists, Developers and Faculties, 2014.
Find full textBook chapters on the topic "Secure Routing algorithm"
Shi, Shudong. "A Secure Routing Algorithm for MANET." In Advances in Computation and Intelligence. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04843-2_52.
Full textHamidouche, Ranida, Zibouda Aliouat, and Abdelhak Gueroui. "Low Energy-Efficient Clustering and Routing Based on Genetic Algorithm in WSNs." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03101-5_14.
Full textWu, Shu-Yuan, Theodore Brown, and Hsien-Tseng Wang. "A Reaction-Diffusion and Gür Game Based Routing Algorithm for Wireless Sensor Networks." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67550-9_15.
Full textBindra, Sandeep Singh, and Alankrita Aggarwal. "Secure and intelligent routing for CPS using trust-based optimization algorithm." In Artificial Intelligence and Information Technologies. CRC Press, 2024. http://dx.doi.org/10.1201/9781032700502-56.
Full textBounceur, Ahcène, Madani Bezoui, Loic Lagadec, Reinhardt Euler, Laouid Abdelkader, and Mohammad Hammoudeh. "DoTRo: A New Dominating Tree Routing Algorithm for Efficient and Fault-Tolerant Leader Election in WSNs and IoT Networks." In Mobile, Secure, and Programmable Networking. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03101-5_5.
Full textShanthi, H. J., and E. A. Mary Anita. "Secure and Efficient Distance Effect Routing Algorithm for Mobility (SE_DREAM) in MANETs." In Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’). Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-30348-2_6.
Full textRavi Kiran Varma, P., Bura Vijay Kumar, K. L. Hemalatha, Muhammed Basim Jabar, and B. M. Manjula. "Secure Clustering and Routing Based on Modified Whale Optimization Algorithm in MANET." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-7876-8_4.
Full textPrashanth, M. N., and Annapurna P. Patil. "Implementation of a Secure and Efficient Routing Algorithm for Vehicular Ad Hoc Networks." In Lecture Notes in Electrical Engineering. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-8240-5_27.
Full textNaga Raju, M., G. Sunil, Zainab Abed Almoussawi, P. Ravi Kiran Varma, and Subhra Chakraborty. "Improved Whale Optimization Algorithm Based Energy Efficient Secure Routing in Mobile Wireless Sensor Networks." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2025. https://doi.org/10.1007/978-981-97-7876-8_5.
Full textKumar, Bandani Anil, Makam Venkata Subamanyam, and Kodati Satya Prasad. "An Enhanced Energy Constraint Secure Routing Protocol for Clustered Randomly Distributed MANETs Using ADAM’s Algorithm." In Computer Networks and Inventive Communication Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-3728-5_66.
Full textConference papers on the topic "Secure Routing algorithm"
Muruganandam, S., S.Gnanavel, K.E.Narayana, M.Jaeyalakshmi, and K. Antony Kumar. "Hybrid Algorithm for Secure Routing in MANET Using Cryptographic Applications." In 2024 International Conference on Electronic Systems and Intelligent Computing (ICESIC). IEEE, 2024. https://doi.org/10.1109/icesic61777.2024.10846551.
Full textCao, Qundan, and Xiuwu Yu. "WSN Secure Routing Protocol Based on an Improved WOA Algorithm." In 2024 4th International Conference on Electronic Information Engineering and Computer (EIECT). IEEE, 2024. https://doi.org/10.1109/eiect64462.2024.10866046.
Full textWu, Kaijun, Bo Tian, and Xue Wang. "A Secure Routing Method by Neural Combination Optimization Decision Algorithm Based on Overlay Network." In 2024 International Conference on Networking and Network Applications (NaNA). IEEE, 2024. http://dx.doi.org/10.1109/nana63151.2024.00036.
Full textMallikarjuna, Shruthi Bennur, and Channakrishna Raju. "Similarity Preference Weight Based Chimp Optimization Algorithm for Secure Clustering and Routing in IoT." In 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC). IEEE, 2024. https://doi.org/10.1109/icmnwc63764.2024.10872084.
Full textKalaivani, R., K. Aruna, S. Tamilarasan, and J. Jayapriya. "Pelican Optimization Algorithm for Mobile Secure Routing in Intrusion Detection Systesm in Wireless Sensor Networks." In 2024 International Conference on Data Science and Network Security (ICDSNS). IEEE, 2024. http://dx.doi.org/10.1109/icdsns62112.2024.10690985.
Full textNara, Nalini, Raja Sekhar C, Tagore Sai Prasad G, Sireesha N, and Madhavilatha Idimadakala. "A Comprehensive Study of Secure Clustering and Routing for MANET using Fuzzy Clustering and Optimization Algorithm." In 2025 4th International Conference on Distributed Computing and Electrical Circuits and Electronics (ICDCECE). IEEE, 2025. https://doi.org/10.1109/icdcece65353.2025.11034888.
Full textM, Asha Rani, and Roopashree H. R. "Robust Wireless Sensor Network using Enhanced Trust-Based Secure and Energy-Efficient Routing Algorithm (ETBSEER) to Prevent Malicious Nodes." In 2024 Second International Conference on Advances in Information Technology (ICAIT). IEEE, 2024. http://dx.doi.org/10.1109/icait61638.2024.10690507.
Full textN, Deepak B., Mallanagouda Biradar, Vijayalaxmi Joshi, and Krunal B. Pawar. "Reliable and Secured Cluster Based Routing in WSN via Lyrebird-Panda Optimization Algorithm." In 2024 International Conference on Integrated Intelligence and Communication Systems (ICIICS). IEEE, 2024. https://doi.org/10.1109/iciics63763.2024.10859367.
Full textPing Li, Jin Zhang, and Ya-ping Lin. "Multipath-Based Secure Routing Algorithm for Sensor Network." In 2006 6th World Congress on Intelligent Control and Automation. IEEE, 2006. http://dx.doi.org/10.1109/wcica.2006.1713152.
Full textCheng, Fen-hua, Jin Zhang, and Zheng Ma. "Curve-Based Secure Routing Algorithm for Sensor Network." In 2006 International Conference on Intelligent Information Hiding and Multimedia. IEEE, 2006. http://dx.doi.org/10.1109/iih-msp.2006.264998.
Full textReports on the topic "Secure Routing algorithm"
Pasupuleti, Murali Krishna. Quantum Intelligence: Machine Learning Algorithms for Secure Quantum Networks. National Education Services, 2025. https://doi.org/10.62311/nesx/rr925.
Full text