Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Enhancing Data Forwarding Efficiency in SIoT with Multidimensional Social Relations

    Fang Xu1,2,3, Songhao Jiang1,2, Yi Ma1,2,3,*, Manzoor Ahmed1,3,*, Zenggang Xiong1,2,3, Yuanlin Lyu1,2

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1095-1113, 2024, DOI:10.32604/cmc.2023.046577

    Abstract Effective data communication is a crucial aspect of the Social Internet of Things (SIoT) and continues to be a significant research focus. This paper proposes a data forwarding algorithm based on Multidimensional Social Relations (MSRR) in SIoT to solve this problem. The proposed algorithm separates message forwarding into intra- and cross-community forwarding by analyzing interest traits and social connections among nodes. Three new metrics are defined: the intensity of node social relationships, node activity, and community connectivity. Within the community, messages are sent by determining which node is most similar to the sender by weighing the strength of social connections… More >

  • Open Access

    ARTICLE

    Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation

    Y. M. Mahaboob John1,*, G. Ravi2

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3653-3666, 2023, DOI:10.32604/csse.2023.036916

    Abstract Mobile Ad-hoc Network (MANET) routing problems are thoroughly studied several approaches are identified in support of MANET. Improve the Quality of Service (QoS) performance of MANET is achieving higher performance. To reduce this drawback, this paper proposes a new secure routing algorithm based on real-time partial ME (Mobility, energy) approximation. The routing method RRME (Real-time Regional Mobility Energy) divides the whole network into several parts, and each node’s various characteristics like mobility and energy are randomly selected neighbors accordingly. It is done in the path discovery phase, estimated to identify and remove malicious nodes. In addition, Trusted Forwarding Factor (TFF)… More >

Displaying 1-10 on page 1 of 2. Per Page