Skip to main content
Erschienen in: Mobile Networks and Applications 1/2023

01.10.2022

Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation

verfasst von: Udayakumar Allimuthu, K. Mahalakshmi

Erschienen in: Mobile Networks and Applications | Ausgabe 1/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In MANET, routing plays a vital role in packet interaction and data transmission. It is always easy to manage the data transmission over the MANET because of uncentralized control on the MANET nodes. Since the efficient route on MANET controls the packets and does not simplify the route between the source and destination. Hence the maintenance of route interaction becomes a crucial process. Methods: It is critical to enhance the route and decrease the attacker to sustain successful data transfers via the MANET Network. MANET, on the other hand, permits route interaction with security threads. The four processing schema are proposed in this study work to retain the security safeguards against Routing Protocols. The Rushing Attacker has significantly influenced MANET packet-based data transfer, particularly node communication. The Attacker Detection Automation of Bee Colony Optimization (ADABCP) Method is proposed in this article. Results: Existing ESCT, ZRDM-LFPM, and ENM-LAC techniques were compared to the suggested outcome. Consequently, routing and data transfer have enhanced the proposed illustration (SIRT-ADABCP-HRLD). Compared to the recommended approach, the end-to-end latency, communication overhead, packet delivery ratio, network lifetime, and energy usage are all improved. Discussion: The performance evaluation results of SIRT–ADABCP-HRLD with existing methods in terms of low End to End Delay (ms) of 49.8361% compared to existing methods ESCT, ENM-LAC, and ZRDM-LFPM. In terms of low Communication Overhead, an 81.4462% decrease compared to existing methods. However, it improves packet delivery by 56.9775%, more than ESCT, ENM-LAC, and ZRDM-LFPM. The energy consumption decreased by 36.31% less value than the existing process.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
2.
Zurück zum Zitat Al Shahrani AS (2011) Rushing attack in mobile ad hoc networks. In 2011 Third International Conference on Intelligent Networking and Collaborative Systems. IEEE, pp. 752–758 Al Shahrani AS (2011) Rushing attack in mobile ad hoc networks. In 2011 Third International Conference on Intelligent Networking and Collaborative Systems. IEEE, pp. 752–758
3.
Zurück zum Zitat Allimuthu U (2017) BAU FAM: biometric-blacklisting anonymous users using fictitious and adroit manager. J Adv Res Dyn Control Syst (12-Special) 722 Allimuthu U (2017) BAU FAM: biometric-blacklisting anonymous users using fictitious and adroit manager. J Adv Res Dyn Control Syst (12-Special) 722
4.
Zurück zum Zitat Al-Zahrani FA (2020) On modeling optimizations and enhancing routing protocols for wireless multihop networks. IEEE Access 8:68953–68973CrossRef Al-Zahrani FA (2020) On modeling optimizations and enhancing routing protocols for wireless multihop networks. IEEE Access 8:68953–68973CrossRef
5.
Zurück zum Zitat Alzamzami O, Mahgoub I (2020) Link Utility Aware Geographic Routing for Urban VANETs using Two-Hop Neighbor Information. Ad Hoc Networks 106:102213 Alzamzami O, Mahgoub I (2020) Link Utility Aware Geographic Routing for Urban VANETs using Two-Hop Neighbor Information. Ad Hoc Networks 106:102213
6.
Zurück zum Zitat Amutha S, Balasubramanian K (2018) Secured energy optimized Ad hoc on-demand distance vector routing protocol. Comput Electr Eng 72:766–773CrossRef Amutha S, Balasubramanian K (2018) Secured energy optimized Ad hoc on-demand distance vector routing protocol. Comput Electr Eng 72:766–773CrossRef
7.
Zurück zum Zitat Azimdoost B, Sadjadpour HR, Garcia-Luna-Aceves JJ (2012) Capacity of wireless networks with social behavior. IEEE Trans Wireless Commun 12(1):60–69CrossRef Azimdoost B, Sadjadpour HR, Garcia-Luna-Aceves JJ (2012) Capacity of wireless networks with social behavior. IEEE Trans Wireless Commun 12(1):60–69CrossRef
8.
Zurück zum Zitat Bai J, Sun Y, Phillips C, Cao Y (2017) Toward constructive relay-based cooperative routing in MANETs. IEEE Syst J 12(2):1743–1754CrossRef Bai J, Sun Y, Phillips C, Cao Y (2017) Toward constructive relay-based cooperative routing in MANETs. IEEE Syst J 12(2):1743–1754CrossRef
9.
Zurück zum Zitat Balaji S, Julie EG, Robinson YH, Kumar R, Thong PH (2019) Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model. Comput Stand Interfaces 66:103358CrossRef Balaji S, Julie EG, Robinson YH, Kumar R, Thong PH (2019) Design of a security-aware routing scheme in Mobile Ad-hoc Network using repeated game model. Comput Stand Interfaces 66:103358CrossRef
10.
Zurück zum Zitat Bamhdi AM (2020) Efficient dynamic-power AODV routing protocol based on node density. Comput Stand Interfaces 70:103406 Bamhdi AM (2020) Efficient dynamic-power AODV routing protocol based on node density. Comput Stand Interfaces 70:103406
11.
Zurück zum Zitat Bozorgi AM, Farasat M, Mahmoud A (2017) A time and energy efficient routing algorithm for electric vehicles based on historical driving data. IEEE Trans Intelligent Vehicles 2(4):308–320CrossRef Bozorgi AM, Farasat M, Mahmoud A (2017) A time and energy efficient routing algorithm for electric vehicles based on historical driving data. IEEE Trans Intelligent Vehicles 2(4):308–320CrossRef
12.
Zurück zum Zitat Cai RJ, Li XJ, Chong PHJ (2018) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42–55CrossRef Cai RJ, Li XJ, Chong PHJ (2018) An evolutionary self-cooperative trust scheme against routing disruptions in MANETs. IEEE Trans Mob Comput 18(1):42–55CrossRef
13.
Zurück zum Zitat Chen YH, Wu EHK, Lin CH, Chen GH (2017) Bandwidth-satisfied and coding-aware multicast protocol in MANETs. IEEE Trans Mob Comput 17(8):1778–1790CrossRef Chen YH, Wu EHK, Lin CH, Chen GH (2017) Bandwidth-satisfied and coding-aware multicast protocol in MANETs. IEEE Trans Mob Comput 17(8):1778–1790CrossRef
14.
Zurück zum Zitat Chen Z, Zhou W, Wu S, Cheng L (2020) An Adaptive on-demand multipath routing protocol WithQoS support for high-speed MANET. IEEE Access 8:44760–44773CrossRef Chen Z, Zhou W, Wu S, Cheng L (2020) An Adaptive on-demand multipath routing protocol WithQoS support for high-speed MANET. IEEE Access 8:44760–44773CrossRef
15.
Zurück zum Zitat Cheung M, She J (2019) Detecting social signals in user-shared images for connection discovery using deep learning. IEEE Trans Multimedia 22(2):407–420CrossRef Cheung M, She J (2019) Detecting social signals in user-shared images for connection discovery using deep learning. IEEE Trans Multimedia 22(2):407–420CrossRef
16.
Zurück zum Zitat Chintalapalli RM, Ananthula VR (2018) M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network. IET Commun 12(12):1406–1415CrossRef Chintalapalli RM, Ananthula VR (2018) M-LionWhale: multi-objective optimisation model for secure routing in mobile ad-hoc network. IET Commun 12(12):1406–1415CrossRef
17.
Zurück zum Zitat Chithaluru P, Tiwari R, Kumar K (2019) AREOR–Adaptive ranking based energy efficient opportunistic routing scheme in Wireless Sensor Network. Comput Netw 162:106863CrossRef Chithaluru P, Tiwari R, Kumar K (2019) AREOR–Adaptive ranking based energy efficient opportunistic routing scheme in Wireless Sensor Network. Comput Netw 162:106863CrossRef
18.
Zurück zum Zitat Chocoteco J, Morales R, Feliu V, Sánchez L (2014) Trajectory planning for a stair-climbing mobility system using laser distance sensors. IEEE Syst J 10(3):944–956CrossRef Chocoteco J, Morales R, Feliu V, Sánchez L (2014) Trajectory planning for a stair-climbing mobility system using laser distance sensors. IEEE Syst J 10(3):944–956CrossRef
19.
Zurück zum Zitat Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467 Djedjig N, Tandjaoui D, Medjek F, Romdhani I (2020) Trust-aware and cooperative routing protocol for IoT security. J Inf Secur Appl 52:102467
20.
Zurück zum Zitat Elhoseny M, Shankar K (2019) Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans Reliab 69(3):1077–1086CrossRef Elhoseny M, Shankar K (2019) Reliable data transmission model for mobile ad hoc network using signcryption technique. IEEE Trans Reliab 69(3):1077–1086CrossRef
21.
Zurück zum Zitat El-Semary AM, Diab H (2019) BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7:95185–95199CrossRef El-Semary AM, Diab H (2019) BP-AODV: blackhole protected AODV routing protocol for MANETs based on chaotic map. IEEE Access 7:95185–95199CrossRef
22.
Zurück zum Zitat Garaaghaji A, Alfi A (2020) A fuzzy-hierarchical routing algorithm for MANET networks allocation rates problem. Iran J Sci Technol Trans Electr Eng 44(2):1003–1011CrossRef Garaaghaji A, Alfi A (2020) A fuzzy-hierarchical routing algorithm for MANET networks allocation rates problem. Iran J Sci Technol Trans Electr Eng 44(2):1003–1011CrossRef
23.
Zurück zum Zitat Ghoreishi SM, Razak SA, Isnin IF, Chizari H (2014) Rushing attack against routing protocols in Mobile Ad-Hoc Networks. In 2014 International Symposium on Biometrics and Security Technologies (ISBAST). IEEE, pp. 220–224 Ghoreishi SM, Razak SA, Isnin IF, Chizari H (2014) Rushing attack against routing protocols in Mobile Ad-Hoc Networks. In 2014 International Symposium on Biometrics and Security Technologies (ISBAST). IEEE, pp. 220–224
25.
Zurück zum Zitat Govindasamy J, Punniakody S (2018) A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J Electr Syst Inf Technol 5(3):735–744CrossRef Govindasamy J, Punniakody S (2018) A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J Electr Syst Inf Technol 5(3):735–744CrossRef
26.
Zurück zum Zitat Greco S, Molinaro C, Pulice C (2017) Efficient maintenance of shortest distances in dynamic graphs. IEEE Trans Knowl Data Eng 30(3):474–487CrossRef Greco S, Molinaro C, Pulice C (2017) Efficient maintenance of shortest distances in dynamic graphs. IEEE Trans Knowl Data Eng 30(3):474–487CrossRef
28.
Zurück zum Zitat Hahn F, Pappa A, Eisert J (2019) Quantum network routing and local complementation. npj Quantum Inf 5(1):1–7CrossRef Hahn F, Pappa A, Eisert J (2019) Quantum network routing and local complementation. npj Quantum Inf 5(1):1–7CrossRef
29.
Zurück zum Zitat Hammi B, Zeadally S, Labiod H, Khatoun R, Begriche Y, Khoukhi L (2020) A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks, 102118 Hammi B, Zeadally S, Labiod H, Khatoun R, Begriche Y, Khoukhi L (2020) A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks, 102118
31.
Zurück zum Zitat Hayashi Y, Uchiyama N (2018) Onion-like networks are both robust and resilient. Sci Rep 8(1):1–13 Hayashi Y, Uchiyama N (2018) Onion-like networks are both robust and resilient. Sci Rep 8(1):1–13
32.
Zurück zum Zitat Hayat S, Imran M, Liu JB (2019) An efficient computational technique for degree and distance based topological descriptors with applications. IEEE Access 7:32276–32296CrossRef Hayat S, Imran M, Liu JB (2019) An efficient computational technique for degree and distance based topological descriptors with applications. IEEE Access 7:32276–32296CrossRef
33.
Zurück zum Zitat He T, Cai L, Meng T, Chen L, Deng Z, Cao Z (2018) Parallel community detection based on distance dynamics for large-scale network. IEEE Access 6:42775–42789CrossRef He T, Cai L, Meng T, Chen L, Deng Z, Cao Z (2018) Parallel community detection based on distance dynamics for large-scale network. IEEE Access 6:42775–42789CrossRef
35.
Zurück zum Zitat Ho MC, Lim JMY, Soon KL, Chong CY (2019) An improved pheromone-based vehicle rerouting system to reduce traffic congestion. Appl Soft Comput 84:105702CrossRef Ho MC, Lim JMY, Soon KL, Chong CY (2019) An improved pheromone-based vehicle rerouting system to reduce traffic congestion. Appl Soft Comput 84:105702CrossRef
36.
Zurück zum Zitat Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30–40) Hu YC, Perrig A, Johnson DB (2003) Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the 2nd ACM workshop on Wireless security (pp. 30–40)
37.
Zurück zum Zitat Huisman G (2017) Social touch technology: a survey of haptic technology for social touch. IEEE Trans Haptics 10(3):391–408CrossRef Huisman G (2017) Social touch technology: a survey of haptic technology for social touch. IEEE Trans Haptics 10(3):391–408CrossRef
38.
Zurück zum Zitat Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput 16(10):2927–2940CrossRef Hurley-Smith D, Wetherall J, Adekunle A (2017) SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Trans Mob Comput 16(10):2927–2940CrossRef
39.
Zurück zum Zitat Huynh TLD (2020) Does culture matter social distancing under the COVID-19 pandemic? Saf Sci 130:104872 Huynh TLD (2020) Does culture matter social distancing under the COVID-19 pandemic? Saf Sci 130:104872
40.
Zurück zum Zitat Islabudeen M, Devi MK (2020) A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wirel Pers Commun 112(1):193–224CrossRef Islabudeen M, Devi MK (2020) A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wirel Pers Commun 112(1):193–224CrossRef
41.
Zurück zum Zitat Jabbar WA, Saad WK, Ismail M (2018) MEQSA-OLSRv2: A multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access 6:76546–76572CrossRef Jabbar WA, Saad WK, Ismail M (2018) MEQSA-OLSRv2: A multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access 6:76546–76572CrossRef
42.
Zurück zum Zitat Jain M, Sharma N, Gupta A, Rawal D, Garg P (2020) Performance analysis of NOMA assisted mobile ad hoc networks for sustainable future radio access. IEEE Trans Sustain Comput 6(2):347–357CrossRef Jain M, Sharma N, Gupta A, Rawal D, Garg P (2020) Performance analysis of NOMA assisted mobile ad hoc networks for sustainable future radio access. IEEE Trans Sustain Comput 6(2):347–357CrossRef
43.
Zurück zum Zitat Jaiswal RK (2020) Position-based routing protocol using Kalman filter as a prediction module for vehicular ad hoc networks. Comput Electr Eng 83:106599CrossRef Jaiswal RK (2020) Position-based routing protocol using Kalman filter as a prediction module for vehicular ad hoc networks. Comput Electr Eng 83:106599CrossRef
44.
Zurück zum Zitat Jeong C, Shin WY (2018) Network-decomposed hierarchical cooperation in ad hoc networks with social relationships. IEEE Trans Wireless Commun 17(11):7606–7619CrossRef Jeong C, Shin WY (2018) Network-decomposed hierarchical cooperation in ad hoc networks with social relationships. IEEE Trans Wireless Commun 17(11):7606–7619CrossRef
45.
Zurück zum Zitat Kacem I, Sait B, Mekhilef S, Sabeur N (2018) A new routing approach for mobile ad hoc systems based on fuzzy Petri nets and ant system. IEEE Access 6:65705–65720CrossRef Kacem I, Sait B, Mekhilef S, Sabeur N (2018) A new routing approach for mobile ad hoc systems based on fuzzy Petri nets and ant system. IEEE Access 6:65705–65720CrossRef
47.
Zurück zum Zitat Khudayer BH, Anbar M, Hanshi SM, Wan TC (2020) Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access 8:24019–24032CrossRef Khudayer BH, Anbar M, Hanshi SM, Wan TC (2020) Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access 8:24019–24032CrossRef
48.
Zurück zum Zitat Landi D, Ponzano M, Nicoletti CG, Cecchi G, Cola G, Mataluni G, ..., Marfia GA (2020) Adherence to social distancing and use of personal protective equipment and the risk of SARS-CoV-2 infection in a cohort of patients with multiple sclerosis. Mult Scler Relat Disord 45: 102359 Landi D, Ponzano M, Nicoletti CG, Cecchi G, Cola G, Mataluni G, ..., Marfia GA (2020) Adherence to social distancing and use of personal protective equipment and the risk of SARS-CoV-2 infection in a cohort of patients with multiple sclerosis. Mult Scler Relat Disord 45: 102359
49.
Zurück zum Zitat Li J, Ning Z, Jedari B, Xia F, Lee I, Tolba A (2016) Geo-social distance-based data dissemination for socially aware networking. IEEE Access 4:1444–1453CrossRef Li J, Ning Z, Jedari B, Xia F, Lee I, Tolba A (2016) Geo-social distance-based data dissemination for socially aware networking. IEEE Access 4:1444–1453CrossRef
50.
Zurück zum Zitat Li J, Sun Y, Li M, Fan W, Zhong Y (2020) Social distance modulates prosocial behaviors in the gain and loss contexts: An event-related potential (ERP) study. Int J Psychophysiol 150:83–91CrossRef Li J, Sun Y, Li M, Fan W, Zhong Y (2020) Social distance modulates prosocial behaviors in the gain and loss contexts: An event-related potential (ERP) study. Int J Psychophysiol 150:83–91CrossRef
51.
Zurück zum Zitat Li Z, Wu Y (2017) Smooth mobility and link reliability-based optimized link state routing scheme for manets. IEEE Commun Lett 21(7):1529–1532CrossRef Li Z, Wu Y (2017) Smooth mobility and link reliability-based optimized link state routing scheme for manets. IEEE Commun Lett 21(7):1529–1532CrossRef
52.
Zurück zum Zitat Liu L, Li CF, Lei YM, Zhao JJ, Yin JY, Sun XK (2016) A new fuzzy clustering method with neighborhood distance constraint for volcanic ash cloud. IEEE Access 4:7005–7013CrossRef Liu L, Li CF, Lei YM, Zhao JJ, Yin JY, Sun XK (2016) A new fuzzy clustering method with neighborhood distance constraint for volcanic ash cloud. IEEE Access 4:7005–7013CrossRef
53.
Zurück zum Zitat Liu S, Zhang DG, Liu XH, Zhang T, Gao JX, Cui YY (2019) Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access 7:21343–21358CrossRef Liu S, Zhang DG, Liu XH, Zhang T, Gao JX, Cui YY (2019) Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access 7:21343–21358CrossRef
54.
Zurück zum Zitat Liu Y, Pi D, Cui L (2017) Metric learning combining with boosting for user distance measure in multiple social networks. IEEE Access 5:19342–19351CrossRef Liu Y, Pi D, Cui L (2017) Metric learning combining with boosting for user distance measure in multiple social networks. IEEE Access 5:19342–19351CrossRef
55.
Zurück zum Zitat Ma S, Feng K, Li J, Wang H, Cong G, Huai J (2016) Proxies for shortest path and distance queries. IEEE Trans Knowl Data Eng 28(7):1835–1850CrossRef Ma S, Feng K, Li J, Wang H, Cong G, Huai J (2016) Proxies for shortest path and distance queries. IEEE Trans Knowl Data Eng 28(7):1835–1850CrossRef
56.
Zurück zum Zitat Mahmood A, Small M, Al-Maadeed SA, Rajpoot N (2016) Using geodesic space density gradients for network community detection. IEEE Trans Knowl Data Eng 29(4):921–935CrossRef Mahmood A, Small M, Al-Maadeed SA, Rajpoot N (2016) Using geodesic space density gradients for network community detection. IEEE Trans Knowl Data Eng 29(4):921–935CrossRef
57.
Zurück zum Zitat Marhefka S, Lockhart E, Turner D (2020) Achieve research continuity during social distancing by rapidly implementing individual and group videoconferencing with participants: key considerations, best practices, and protocols. AIDS Behav, p 1. https://doi.org/10.1007/s10461-020-02837-x Marhefka S, Lockhart E, Turner D (2020) Achieve research continuity during social distancing by rapidly implementing individual and group videoconferencing with participants: key considerations, best practices, and protocols. AIDS Behav, p 1. https://​doi.​org/​10.​1007/​s10461-020-02837-x
58.
Zurück zum Zitat Martensen LK, Hahn E, Cao TD, Schomerus G, Nguyen MH, Böge K, ..., Ta TMT (2018) Impact of perceived course of illness on the desire for social distance towards people with symptoms of schizophrenia in Hanoi, Vietnam. Psychiatry Res 268: 206-210 Martensen LK, Hahn E, Cao TD, Schomerus G, Nguyen MH, Böge K, ..., Ta TMT (2018) Impact of perceived course of illness on the desire for social distance towards people with symptoms of schizophrenia in Hanoi, Vietnam. Psychiatry Res 268: 206-210
59.
Zurück zum Zitat Martensen LK, Hahn E, Duc CT, Schomerus G, Böge K, Dettling M, Angermeyer MC, Ta TMT (2020) Impact and differences of illness course perception on the desire for social distance towards people with symptoms of depression or schizophrenia in Hanoi, Vietnam. Asian J Psychiatr 50:101973. https://doi.org/10.1016/j.ajp.2020.101973 Martensen LK, Hahn E, Duc CT, Schomerus G, Böge K, Dettling M, Angermeyer MC, Ta TMT (2020) Impact and differences of illness course perception on the desire for social distance towards people with symptoms of depression or schizophrenia in Hanoi, Vietnam. Asian J Psychiatr 50:101973. https://​doi.​org/​10.​1016/​j.​ajp.​2020.​101973
61.
Zurück zum Zitat Meng Q, Zhou M, Liu J, Dong H (2019) Pedestrian evacuation with herding behavior in the view-limited condition. IEEE Trans Comput Soc Syst 6(3):567–575CrossRef Meng Q, Zhou M, Liu J, Dong H (2019) Pedestrian evacuation with herding behavior in the view-limited condition. IEEE Trans Comput Soc Syst 6(3):567–575CrossRef
65.
Zurück zum Zitat Olivera-La Rosa A, Chuquichambi EG, Ingram GP (2020) Keep your (social) distance: pathogen concerns and social perception in the time of COVID-19. Personal Individ Differ 166:110200CrossRef Olivera-La Rosa A, Chuquichambi EG, Ingram GP (2020) Keep your (social) distance: pathogen concerns and social perception in the time of COVID-19. Personal Individ Differ 166:110200CrossRef
66.
Zurück zum Zitat Qiao M, Cheng H, Chang L, Yu JX (2012) Approximate shortest distance computing: a query-dependent local landmark scheme. IEEE Trans Knowl Data Eng 26(1):55–68CrossRef Qiao M, Cheng H, Chang L, Yu JX (2012) Approximate shortest distance computing: a query-dependent local landmark scheme. IEEE Trans Knowl Data Eng 26(1):55–68CrossRef
67.
Zurück zum Zitat Qin Z, Gan X, Shen M, Wang X, Tian X (2016) Capacity of wireless networks with social behavior and directional antennas. In 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, pp. 1–6 Qin Z, Gan X, Shen M, Wang X, Tian X (2016) Capacity of wireless networks with social behavior and directional antennas. In 2016 IEEE Global Communications Conference (GLOBECOM). IEEE, pp. 1–6
68.
Zurück zum Zitat Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369–10381CrossRef Taha A, Alsaqour R, Uddin M, Abdelhaq M, Saba T (2017) Energy efficient multipath routing protocol for mobile ad-hoc network using the fitness function. IEEE Access 5:10369–10381CrossRef
69.
Zurück zum Zitat Thu TPB, Ngoc PNH, Hai NM (2020) Effect of the social distancing measures on the spread of COVID-19 in 10 highly infected countries. Sci Total Environ 742:140430CrossRef Thu TPB, Ngoc PNH, Hai NM (2020) Effect of the social distancing measures on the spread of COVID-19 in 10 highly infected countries. Sci Total Environ 742:140430CrossRef
70.
Zurück zum Zitat Tsay C, Lejarza F, Stadtherr MA, Baldea M (2020) Modeling, state estimation, and optimal control for the US COVID-19 outbreak. Sci Rep 10(1):10711 Tsay C, Lejarza F, Stadtherr MA, Baldea M (2020) Modeling, state estimation, and optimal control for the US COVID-19 outbreak. Sci Rep 10(1):10711
73.
Zurück zum Zitat Wang X, Zhang Y, Zhang W, Lin X (2016) Efficient distance-aware influence maximization in geo-social networks. IEEE Trans Knowl Data Eng 29(3):599–612CrossRef Wang X, Zhang Y, Zhang W, Lin X (2016) Efficient distance-aware influence maximization in geo-social networks. IEEE Trans Knowl Data Eng 29(3):599–612CrossRef
75.
Zurück zum Zitat Xia F, Liaqat HB, Deng J, Wan J, Das SK (2015) Overhead control with reliable transmission of popular packets in ad-hoc social networks. IEEE Trans Veh Technol 65(9):7647–7661CrossRef Xia F, Liaqat HB, Deng J, Wan J, Das SK (2015) Overhead control with reliable transmission of popular packets in ad-hoc social networks. IEEE Trans Veh Technol 65(9):7647–7661CrossRef
76.
Zurück zum Zitat Xu C, Zhu L, Liu Y, Guan J, Yu S (2018) DP-LTOD: differential privacy latent trajectory community discovering services over location-based social networks. IEEE Trans Services Comput 14(4):1068–1083CrossRef Xu C, Zhu L, Liu Y, Guan J, Yu S (2018) DP-LTOD: differential privacy latent trajectory community discovering services over location-based social networks. IEEE Trans Services Comput 14(4):1068–1083CrossRef
77.
Zurück zum Zitat Yan L, Shen H, Chen K (2016) TSearch: Target-oriented low-delay node searching in DTNs with social network properties. IEEE/ACM Trans Netw 24(6):3841–3855CrossRef Yan L, Shen H, Chen K (2016) TSearch: Target-oriented low-delay node searching in DTNs with social network properties. IEEE/ACM Trans Netw 24(6):3841–3855CrossRef
78.
Zurück zum Zitat Yang CC, Ng TD (2011) Analyzing and visualizing web opinion development and social interactions with density-based clustering. IEEE Trans Syst Man Cybernetics-Part A: Syst Humans 41(6):1144–1155CrossRef Yang CC, Ng TD (2011) Analyzing and visualizing web opinion development and social interactions with density-based clustering. IEEE Trans Syst Man Cybernetics-Part A: Syst Humans 41(6):1144–1155CrossRef
79.
Zurück zum Zitat Ye Q, Zhao H, Li Z, Yang X, Gao S, Yin T, Ye N (2017) L1-norm distance minimization-based fast robust twin support vector $ k $-plane clustering. IEEE Trans Neural Netw Learn Syst 29(9):4494–4503 Ye Q, Zhao H, Li Z, Yang X, Gao S, Yin T, Ye N (2017) L1-norm distance minimization-based fast robust twin support vector $ k $-plane clustering. IEEE Trans Neural Netw Learn Syst 29(9):4494–4503
80.
Zurück zum Zitat Yezli S, Khan A (2020) COVID-19 social distancing in the Kingdom of Saudi Arabia: Bold measures in the face of political, economic, social and religious challenges. Travel Med Infect Dis 37:101692 Yezli S, Khan A (2020) COVID-19 social distancing in the Kingdom of Saudi Arabia: Bold measures in the face of political, economic, social and religious challenges. Travel Med Infect Dis 37:101692
81.
Zurück zum Zitat Zhang L, Hu L, Hu F, Ye Z, Li X, Kumar S (2020) Enhanced OLSR routing for airborne networks with multi-beam directional antennas. Ad Hoc Networks, 102116 Zhang L, Hu L, Hu F, Ye Z, Li X, Kumar S (2020) Enhanced OLSR routing for airborne networks with multi-beam directional antennas. Ad Hoc Networks, 102116
82.
Zurück zum Zitat Zhang T, Zhao S, Cheng B (2020) Multipath Routing and MPTCP-Based Data Delivery Over Manets. IEEE Access 8:32652–32673CrossRef Zhang T, Zhao S, Cheng B (2020) Multipath Routing and MPTCP-Based Data Delivery Over Manets. IEEE Access 8:32652–32673CrossRef
83.
Zurück zum Zitat Zhao Y, Yang LT, Zhang R (2018) Tensor-based multiple clustering approaches for cyber-physical-social applications. IEEE Trans Emerg Top Comput 8(1):69–81CrossRef Zhao Y, Yang LT, Zhang R (2018) Tensor-based multiple clustering approaches for cyber-physical-social applications. IEEE Trans Emerg Top Comput 8(1):69–81CrossRef
Metadaten
Titel
Efficient Mobile Ad Hoc Route Maintenance Against Social Distances Using Attacker Detection Automation
verfasst von
Udayakumar Allimuthu
K. Mahalakshmi
Publikationsdatum
01.10.2022
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 1/2023
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-022-02040-3

Weitere Artikel der Ausgabe 1/2023

Mobile Networks and Applications 1/2023 Zur Ausgabe

Neuer Inhalt