Hybrid Authentication Using Node Trustworthy to Detect Vulnerable Nodes.
S. M. Udhaya SankarS. Thanga RevathiR. ThiagarajanPublished in: Comput. Syst. Sci. Eng. (2023)
Keyphrases
- graph structure
- directed graph
- neighboring nodes
- root node
- network nodes
- intermediate nodes
- tree nodes
- undirected graph
- shortest distance
- overlapping communities
- destination node
- mobile nodes
- detection algorithm
- detection method
- finding the shortest path
- parent child
- malicious nodes
- hidden nodes
- node selection
- betweenness centrality
- edge weights
- tree structure
- residual energy
- black hole
- detect malicious
- path length
- ad hoc networks
- shortest path
- sink node
- biometric authentication
- centrality measures
- spanning tree
- nodes of a graph
- wireless sensor networks