Improving Network Security Based on Trust-Aware Routing Protocols Using Long Short-Term Memory-Queuing Segment-Routing Algorithms.
Muthukumaran V.Vinoth Kumar V.Rose Bindu JosephMeram MunirathanamBalajee JeyakumarPublished in: Int. J. Inf. Technol. Proj. Manag. (2021)
Keyphrases
- network security
- routing algorithm
- routing protocol
- network traffic
- ad hoc networks
- intrusion detection
- computer networks
- wireless sensor networks
- intrusion detection system
- multipath
- energy consumption
- mobile ad hoc networks
- network topology
- packet delivery
- shortest path
- end to end delay
- information security
- multi hop
- ip networks
- sensor networks
- anomaly detection
- routing scheme
- energy efficient
- routing tables
- data transmission
- wireless ad hoc networks
- mobile nodes
- cross layer
- network coding
- network routing
- energy efficiency
- end to end
- network management
- network layer
- network resources
- wireless mesh networks
- real time
- ad hoc on demand distance vector
- message overhead
- source node
- computer systems