Efficient selfish node detection using SVM in IoT‐MANET environment
The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge...
Saved in:
Published in | Transactions on emerging telecommunications technologies Vol. 34; no. 12 |
---|---|
Main Authors | , , , , , |
Format | Journal Article |
Language | English |
Published |
01.12.2023
|
Online Access | Get full text |
Cover
Loading…
Abstract | The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption.
This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. |
---|---|
AbstractList | The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption.
This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption. |
Author | Saif, Abdu Ghosh, Subhankar Sufian, Abu Gupta, Sachin Kumar Banerjee, Anuradha Alsamhi, S. H. |
Author_xml | – sequence: 1 givenname: Subhankar surname: Ghosh fullname: Ghosh, Subhankar organization: Regent Education and Research Foundation – sequence: 2 givenname: Anuradha surname: Banerjee fullname: Banerjee, Anuradha organization: Kalyani Government Engineering College – sequence: 3 givenname: Abu surname: Sufian fullname: Sufian, Abu organization: University of Gour Banga – sequence: 4 givenname: Sachin Kumar surname: Gupta fullname: Gupta, Sachin Kumar email: sachin.gupta@smvdu.ac.in organization: Shri Mata Vaishno Devi University, Katra – sequence: 5 givenname: S. H. surname: Alsamhi fullname: Alsamhi, S. H. organization: IBB University – sequence: 6 givenname: Abdu surname: Saif fullname: Saif, Abdu organization: Taiz University |
BookMark | eNp1kLFOwzAQhi1UJEqpxCN4ZEk5J3HsjFUVaKUWBgJr5LhnMEodFBtQNx6BZ-RJSCkDQnDLf8P3n07fMRm41iEhpwwmDCA-xxAmqeTygAxjlrEoyRkf_NiPyNj7R-hH8JinckiKwhirLbpAPTbG-gfq2jXSNQbUwbaOPnvr7unN3YpaRxdt-fH2vppeFSVF92K71m367gk5NKrxOP7OEbm9KMrZPFpeXy5m02Wk4zyXkalzaUSt6lznXOgMTMphnaUi5joBzgBryISCVCYCpAHTIypRmRAoueAqGZHJ_q7uWu87NJW2Qe3eDJ2yTcWg2nmoeg_VzkNfOPtVeOrsRnXbv9Boj77aBrf_clVRll_8J5m9bfs |
CitedBy_id | crossref_primary_10_3233_IDT_230579 crossref_primary_10_1002_ett_4955 crossref_primary_10_1002_ett_70026 crossref_primary_10_1007_s11042_024_20092_3 crossref_primary_10_1002_ett_70008 |
Cites_doi | 10.1109/FiCloud.2018.00024 10.1007/s11277-019-06378-y 10.1109/JSEN.2015.2504106 10.1007/s13369-013-0813-9 10.1109/ICACCCN.2018.8748632 10.1007/978-981-16-7469-3_96 10.1002/dac.991 10.1109/ITNAC46935.2019.9077968 10.1016/j.compeleceng.2022.107902 10.1007/s12652-020-01797-3 10.1186/s13638-019-1564-4 10.1007/s11036-008-0145-2 10.3390/electronics10141635 10.1186/1687-1499-2012-97 10.1007/s10776-021-00505-y 10.1007/b95439 10.12720/jcm.14.2.110-120 10.1109/ACCESS.2020.3006043 10.1002/ett.4432 10.1016/j.jpdc.2012.04.007 10.1002/ett.4446 10.1109/TMC.2018.2828814 10.1145/513800.513828 10.5121/ijasuc.2021.12201 10.48084/etasr.1810 10.1007/978-3-540-78773-0_31 10.1007/978-3-030-66222-6_12 10.1109/JCN.2014.000066 10.1007/978-0-387-35612-9_9 10.1109/JSAC.2007.070805 10.1002/itl2.355 10.1016/j.jnca.2021.103118 |
ContentType | Journal Article |
Copyright | 2023 John Wiley & Sons, Ltd. |
Copyright_xml | – notice: 2023 John Wiley & Sons, Ltd. |
DBID | AAYXX CITATION |
DOI | 10.1002/ett.4858 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 2161-3915 |
EndPage | n/a |
ExternalDocumentID | 10_1002_ett_4858 ETT4858 |
Genre | researchArticle |
GroupedDBID | .GA .Y3 05W 1OC 31~ 50Z 8-0 8-1 8-3 8-4 8-5 930 A03 AAEVG AAHHS AAHQN AAMNL AANHP AANLZ AAXRX AAYCA AAZKR ABCUV ACAHQ ACBWZ ACCFJ ACCZN ACPOU ACRPL ACXBN ACXQS ACYXJ ADBBV ADEOM ADIZJ ADKYN ADMGS ADNMO ADOZA ADXAS ADZMN AEEZP AEGXH AEIGN AEIMD AENEX AEQDE AEUQT AEUYR AFBPY AFFPM AFGKR AFPWT AFWVQ AFZJQ AHBTC AITYG AIURR AIWBW AJBDE AJXKR ALMA_UNASSIGNED_HOLDINGS ALUQN ALVPJ AMBMR AMYDB ATUGU AUFTA AZFZN BDRZF BFHJK BHBCM BMNLL BMXJE BRXPI D-E D-F DCZOG DPXWK DRFUL DRSTM EBS EJD F00 F01 F04 F21 G-S GODZA HGLYW IN- LATKE LEEKS LH4 LITHE LOXES LUTES LW6 LYRES MEWTI MRFUL MRSTM MSFUL MSSTM MXFUL MXSTM RX1 SUPJJ V2E WIH WIK WXSBR AAYXX ADMLS AGHNM AGQPQ AGYGG CITATION |
ID | FETCH-LOGICAL-c2998-fb98f7bab9c957c60f450d64725c30510eb067a0483708f0fc60a3a677e8575a3 |
ISSN | 2161-3915 |
IngestDate | Tue Jul 01 03:49:30 EDT 2025 Thu Apr 24 23:08:28 EDT 2025 Wed Jan 22 16:15:36 EST 2025 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 12 |
Language | English |
LinkModel | OpenURL |
MergedId | FETCHMERGED-LOGICAL-c2998-fb98f7bab9c957c60f450d64725c30510eb067a0483708f0fc60a3a677e8575a3 |
OpenAccessLink | https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.4858 |
PageCount | 24 |
ParticipantIDs | crossref_citationtrail_10_1002_ett_4858 crossref_primary_10_1002_ett_4858 wiley_primary_10_1002_ett_4858_ETT4858 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | December 2023 2023-12-00 |
PublicationDateYYYYMMDD | 2023-12-01 |
PublicationDate_xml | – month: 12 year: 2023 text: December 2023 |
PublicationDecade | 2020 |
PublicationTitle | Transactions on emerging telecommunications technologies |
PublicationYear | 2023 |
References | 2009; 22 2019; 2019 2012; 2012 2005; 177 2010 2021; 28 2000; 8 2019; 14 2020; 11 2019; 107 2002 2016; 16 2021;13:1‐15 2012; 72 2022; 100 2020; 7 2009; 14 2018; 18 2018; 8 2021; 10 2018; 2 2021; 12 2021; 33 2022 2000 2021 2022; 5 2002; 100 2014; 16 2019 2018 2014; 39 2022; 33 2008; 4957 2007; 25 2021; 190 2020; 29 e_1_2_8_28_1 e_1_2_8_29_1 e_1_2_8_24_1 e_1_2_8_25_1 e_1_2_8_26_1 e_1_2_8_3_1 e_1_2_8_2_1 e_1_2_8_5_1 e_1_2_8_4_1 e_1_2_8_6_1 e_1_2_8_9_1 e_1_2_8_8_1 Mahmoud ME (e_1_2_8_35_1) 2010 e_1_2_8_20_1 e_1_2_8_21_1 Arora DKK (e_1_2_8_27_1) 2020; 29 e_1_2_8_42_1 e_1_2_8_22_1 e_1_2_8_23_1 Joachims T (e_1_2_8_40_1) 2000 e_1_2_8_41_1 e_1_2_8_18_1 e_1_2_8_19_1 Mangayarkarasi R (e_1_2_8_16_1) 2020; 7 e_1_2_8_13_1 e_1_2_8_36_1 e_1_2_8_14_1 e_1_2_8_15_1 e_1_2_8_38_1 e_1_2_8_37_1 Mohamed HE‐D (e_1_2_8_7_1) 2021 Dutt S (e_1_2_8_39_1) 2018 Folayo Aina SY (e_1_2_8_17_1) 2018 e_1_2_8_32_1 e_1_2_8_10_1 e_1_2_8_31_1 e_1_2_8_11_1 e_1_2_8_34_1 e_1_2_8_12_1 e_1_2_8_33_1 e_1_2_8_30_1 |
References_xml | – start-page: 1 year: 2010 end-page: 5 – start-page: 869 year: 2022 end-page: 876 – volume: 16 start-page: 371 year: 2014 end-page: 377 article-title: An energy efficient localized topology control algorithm for wireless multihop networks publication-title: J Commun Netw – volume: 10 year: 2021 article-title: A novel anomaly behavior detection scheme for mobile ad hoc networks publication-title: Electronics – start-page: 104 year: 2018 end-page: 109 – volume: 12 start-page: 1 year: 2021 end-page: 14 article-title: Optimum neighbors for resource‐constrained mobile ad hoc networks publication-title: Int J Ad Hoc Sens Ubiquitous Comput – volume: 7 start-page: 148 year: 2020 end-page: 154 article-title: Cost effective collaborative anomaly detection system for selfish node attacks in MANET publication-title: J Crit Rev – volume: 2019 year: 2019 article-title: Selfish node detection based on hierarchical game theory in IoT publication-title: EURASIP J Wirel Commun Netw – start-page: 1 year: 2019 end-page: 6 – volume: 16 start-page: 1708 year: 2016 end-page: 1715 article-title: Data reduction in wireless sensor networks: a hierarchical LMS prediction approach publication-title: IEEE Sens J – volume: 100 start-page: 107 year: 2002 end-page: 121 – volume: 8 start-page: 124097 year: 2000 end-page: 124109 article-title: A game theory‐based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks publication-title: IEEE Access – year: 2000 – volume: 33 year: 2022 article-title: Improving routing disruption attack detection in MANETs using efficient trust establishment publication-title: Trans Emerg Telecommun Technol – volume: 5 issue: 3 year: 2022 article-title: IoT‐Pi: a machine learning‐based lightweight framework for cost‐effective distributed computing using IoT publication-title: Internet Technol Lett – start-page: 175 year: 2021 end-page: 188 – year: 2021;13:1‐15 article-title: Using MANET in IoT healthcare applications: a survey publication-title: Int J Comput Digit Syst – year: 2018 – volume: 33 year: 2021 article-title: Autoregressive moving average based anycast with support vector machine clustering in mobile ad‐hoc networks publication-title: Trans Emerg Telecommun Technol – volume: 100 year: 2022 article-title: Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol publication-title: Comput Electr Eng – volume: 22 issue: 7 year: 2009 article-title: Eeaodr: an energy ficient ad hoc on‐demand routing protocol for mobile ad hoc networks publication-title: Int J Commun Syst – volume: 29 start-page: 279 year: 2020 end-page: 289 article-title: A study on attacks in mobile ad‐hoc networks publication-title: J Netw Comput Appl – volume: 14 start-page: 178 issue: 2 year: 2009 end-page: 187 article-title: OMH—suppressing selfish behavior in ad hoc networks with one more hop publication-title: Mob Netw Appl – volume: 25 start-page: 1101 issue: 6 year: 2007 end-page: 1112 article-title: Non‐cooperative power control for wireless ad hoc networks with repeated games publication-title: IEEE J Sel Areas Commun – volume: 2012 year: 2012 article-title: Adaptive neighbor‐based topology control protocol for wireless multi‐hop networks publication-title: EURASIP J Wirel Commun Netw – volume: 18 start-page: 42 issue: 1 year: 2018 end-page: 55 article-title: An evolutionary self‐cooperative trust scheme against routing disruptions in MANETs publication-title: IEEE Trans Mob Comput – start-page: 226 year: 2002 end-page: 236 – volume: 14 start-page: 110 issue: 2 year: 2019 end-page: 120 article-title: Survey of recent routing metrics and protocols for mobile ad‐hoc networks publication-title: J Commun – volume: 8 start-page: 2604 issue: 1 year: 2018 end-page: 2608 article-title: MANETs and Internet of Things: the development of a data routing algorithm publication-title: Eng Technol Appl Sci Res – volume: 107 start-page: 2191 issue: 4 year: 2019 end-page: 2209 article-title: Energy and velocity based tree multicast routing in mobile ad‐hoc networks publication-title: Wirel Pers Commun – start-page: 114 year: 2018 end-page: 119 – volume: 72 start-page: 1032 year: 2012 end-page: 1044 article-title: A new distributed topology control algorithm based on optimization of delay and energy in wireless networks publication-title: J Parallel Distrib Comput – volume: 39 start-page: 891 year: 2014 end-page: 901 article-title: Experience based energy efficient reactive routing protocol (EXERP) for mobile ad‐hoc networks publication-title: Arab J Sci Eng – volume: 190 year: 2021 article-title: Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: a comprehensive review publication-title: J Netw Comput Appl – volume: 28 start-page: 199 year: 2021 end-page: 216 article-title: Arma model based anycast AODV (ARMA‐AAODV) for performance improvement in scalable mobile ad hoc networks publication-title: Int J Wirel Inf Netw – volume: 11 start-page: 4995 year: 2020 end-page: 5001 article-title: Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks publication-title: J Ambient Intell Humaniz Comput – volume: 2 start-page: 651 year: 2018 end-page: 671 – volume: 4957 start-page: 350 year: 2008 end-page: 361 – volume: 177 year: 2005 – ident: e_1_2_8_2_1 doi: 10.1109/FiCloud.2018.00024 – ident: e_1_2_8_8_1 doi: 10.1007/s11277-019-06378-y – ident: e_1_2_8_24_1 doi: 10.1109/JSEN.2015.2504106 – ident: e_1_2_8_29_1 doi: 10.1007/s13369-013-0813-9 – ident: e_1_2_8_37_1 doi: 10.1109/ICACCCN.2018.8748632 – ident: e_1_2_8_5_1 doi: 10.1007/978-981-16-7469-3_96 – ident: e_1_2_8_30_1 doi: 10.1002/dac.991 – ident: e_1_2_8_14_1 – ident: e_1_2_8_18_1 doi: 10.1109/ITNAC46935.2019.9077968 – ident: e_1_2_8_33_1 doi: 10.1016/j.compeleceng.2022.107902 – ident: e_1_2_8_10_1 doi: 10.1007/s12652-020-01797-3 – ident: e_1_2_8_15_1 doi: 10.1186/s13638-019-1564-4 – ident: e_1_2_8_13_1 doi: 10.1007/s11036-008-0145-2 – ident: e_1_2_8_31_1 doi: 10.3390/electronics10141635 – ident: e_1_2_8_22_1 doi: 10.1186/1687-1499-2012-97 – ident: e_1_2_8_26_1 doi: 10.1007/s10776-021-00505-y – ident: e_1_2_8_38_1 doi: 10.1007/b95439 – ident: e_1_2_8_3_1 doi: 10.12720/jcm.14.2.110-120 – year: 2021 ident: e_1_2_8_7_1 article-title: Using MANET in IoT healthcare applications: a survey publication-title: Int J Comput Digit Syst – ident: e_1_2_8_42_1 doi: 10.1109/ACCESS.2020.3006043 – ident: e_1_2_8_36_1 – volume-title: Machine Learning year: 2018 ident: e_1_2_8_39_1 – start-page: 651 volume-title: 2018 In Book: Proceedings of the Future Technologies Conference (FTC) year: 2018 ident: e_1_2_8_17_1 – ident: e_1_2_8_9_1 doi: 10.1002/ett.4432 – volume: 7 start-page: 148 year: 2020 ident: e_1_2_8_16_1 article-title: Cost effective collaborative anomaly detection system for selfish node attacks in MANET publication-title: J Crit Rev – ident: e_1_2_8_23_1 doi: 10.1016/j.jpdc.2012.04.007 – volume-title: Training Linear SVMs in Linear Time year: 2000 ident: e_1_2_8_40_1 – ident: e_1_2_8_32_1 doi: 10.1002/ett.4446 – ident: e_1_2_8_28_1 doi: 10.1109/TMC.2018.2828814 – ident: e_1_2_8_20_1 doi: 10.1145/513800.513828 – ident: e_1_2_8_41_1 doi: 10.5121/ijasuc.2021.12201 – ident: e_1_2_8_6_1 doi: 10.48084/etasr.1810 – ident: e_1_2_8_21_1 doi: 10.1007/978-3-540-78773-0_31 – ident: e_1_2_8_4_1 doi: 10.1007/978-3-030-66222-6_12 – volume: 29 start-page: 279 year: 2020 ident: e_1_2_8_27_1 article-title: A study on attacks in mobile ad‐hoc networks publication-title: J Netw Comput Appl – ident: e_1_2_8_25_1 doi: 10.1109/JCN.2014.000066 – start-page: 1 volume-title: Proceedings of the IEEE GlobeCom year: 2010 ident: e_1_2_8_35_1 – ident: e_1_2_8_19_1 doi: 10.1007/978-0-387-35612-9_9 – ident: e_1_2_8_12_1 doi: 10.1109/JSAC.2007.070805 – ident: e_1_2_8_34_1 doi: 10.1002/itl2.355 – ident: e_1_2_8_11_1 doi: 10.1016/j.jnca.2021.103118 |
SSID | ssj0000752548 |
Score | 2.3154263 |
Snippet | The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever... |
SourceID | crossref wiley |
SourceType | Enrichment Source Index Database Publisher |
Title | Efficient selfish node detection using SVM in IoT‐MANET environment |
URI | https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fett.4858 |
Volume | 34 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaW7QUOiKcoLxkJwaHKknWch48LBApie9kU9RbZjqNtqbLVbnJoT_wEfiO_hLGduG61SIVLdmU53pXnkzMz-WY-hF7TWAgSVZqqI8OAVrwKMlbLIAylpCqOE4jmNNviINk_pF-P4qPR6NxjLXWtmMiLrXUl_2NVGAO76irZf7CsWxQG4DvYF65gYbjeyMa56f-g3-Zv1GmtexM1q0oXQrXKKoB3JhOw-D7XaY0vq8JRG-azg7zwq9x8J7W41BA3LxN0DbHRMmq1aI5fUbLZa4fUvEdG_LxcbZaW8iOWvPnBHQH4PW_U-sRyf2ZNt-bV0j0WFl19bLOxM9G5pboz694uDOlzzzDC_UwFiTzWhznQyFTnupgt35yoLWP9idynN3vkka0nve0cq9p2QjPb_P1qM-1rDzlHPbRtmkkJd5b6zltoh0CEQcZoZ_Zx_m3hEnTgS0HwbBQNh_84NC8Oybvhh6-4M354Y_yT4h662wcWeGZRch-NVPMA3fHaTT5EucML7vGCNV6wwws2eMGAF3zcYMDL75-_DFKwh5RH6PBTXnzYD3oZjUASXUBZC5bVqeCCSRanMglrGoeVlg2IZaTPZCXAZeFGWyDM6rCGKTziSZoqLd_Ko8do3Kwa9QRhRpmoJMumMI8KwgRlqVTgUXJa86lIdtHbYTdK2feY11Inp-X1bd9Fr9zMM9tXZcucN2ZD_zqhzItCfz69wWLP0O1LTD5H43bdqRfgT7biZW_5P-0deKA |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+selfish+node+detection+using+SVM+in+IoT%E2%80%90MANET+environment&rft.jtitle=Transactions+on+emerging+telecommunications+technologies&rft.au=Ghosh%2C+Subhankar&rft.au=Banerjee%2C+Anuradha&rft.au=Sufian%2C+Abu&rft.au=Gupta%2C+Sachin+Kumar&rft.date=2023-12-01&rft.issn=2161-3915&rft.eissn=2161-3915&rft.volume=34&rft.issue=12&rft_id=info:doi/10.1002%2Fett.4858&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_ett_4858 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-3915&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-3915&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-3915&client=summon |