Efficient selfish node detection using SVM in IoT‐MANET environment

The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge...

Full description

Saved in:
Bibliographic Details
Published inTransactions on emerging telecommunications technologies Vol. 34; no. 12
Main Authors Ghosh, Subhankar, Banerjee, Anuradha, Sufian, Abu, Gupta, Sachin Kumar, Alsamhi, S. H., Saif, Abdu
Format Journal Article
LanguageEnglish
Published 01.12.2023
Online AccessGet full text

Cover

Loading…
Abstract The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time.
AbstractList The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time.
The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever a node needs to send a message to another node in the network, it needs the help of one or more nodes to act as a router(s) that will bridge the gap between the source and the destination. All these selfless forwarding's require energy, bandwidth, and other resources. Therefore, some routers often raise a link breakage attack to save their resources. They keep silent after receiving a message; neither they acknowledge it nor they forward it. These selfish nodes must be identified and carefully avoided while choosing routes; otherwise, numerous messages will have to be resent, including control messages like route‐request. The identification depends on the past behavior of the node as well as velocity, the direction of movement, current geographical location and so forth. This article presents a support vector machine‐based node classification method that checks whether nodes are intentionally issuing a link breakage attack or it is really out of the radio range of its predecessor. The simulation results of the proposed method demonstrate that the proposed technique can correctly detect most of the selfish activities in the network and that also in much lesser time. It also enhances the packet delivery ratio and reduces delay and energy consumption.
Author Saif, Abdu
Ghosh, Subhankar
Sufian, Abu
Gupta, Sachin Kumar
Banerjee, Anuradha
Alsamhi, S. H.
Author_xml – sequence: 1
  givenname: Subhankar
  surname: Ghosh
  fullname: Ghosh, Subhankar
  organization: Regent Education and Research Foundation
– sequence: 2
  givenname: Anuradha
  surname: Banerjee
  fullname: Banerjee, Anuradha
  organization: Kalyani Government Engineering College
– sequence: 3
  givenname: Abu
  surname: Sufian
  fullname: Sufian, Abu
  organization: University of Gour Banga
– sequence: 4
  givenname: Sachin Kumar
  surname: Gupta
  fullname: Gupta, Sachin Kumar
  email: sachin.gupta@smvdu.ac.in
  organization: Shri Mata Vaishno Devi University, Katra
– sequence: 5
  givenname: S. H.
  surname: Alsamhi
  fullname: Alsamhi, S. H.
  organization: IBB University
– sequence: 6
  givenname: Abdu
  surname: Saif
  fullname: Saif, Abdu
  organization: Taiz University
BookMark eNp1kLFOwzAQhi1UJEqpxCN4ZEk5J3HsjFUVaKUWBgJr5LhnMEodFBtQNx6BZ-RJSCkDQnDLf8P3n07fMRm41iEhpwwmDCA-xxAmqeTygAxjlrEoyRkf_NiPyNj7R-hH8JinckiKwhirLbpAPTbG-gfq2jXSNQbUwbaOPnvr7unN3YpaRxdt-fH2vppeFSVF92K71m367gk5NKrxOP7OEbm9KMrZPFpeXy5m02Wk4zyXkalzaUSt6lznXOgMTMphnaUi5joBzgBryISCVCYCpAHTIypRmRAoueAqGZHJ_q7uWu87NJW2Qe3eDJ2yTcWg2nmoeg_VzkNfOPtVeOrsRnXbv9Boj77aBrf_clVRll_8J5m9bfs
CitedBy_id crossref_primary_10_3233_IDT_230579
crossref_primary_10_1002_ett_4955
crossref_primary_10_1002_ett_70026
crossref_primary_10_1007_s11042_024_20092_3
crossref_primary_10_1002_ett_70008
Cites_doi 10.1109/FiCloud.2018.00024
10.1007/s11277-019-06378-y
10.1109/JSEN.2015.2504106
10.1007/s13369-013-0813-9
10.1109/ICACCCN.2018.8748632
10.1007/978-981-16-7469-3_96
10.1002/dac.991
10.1109/ITNAC46935.2019.9077968
10.1016/j.compeleceng.2022.107902
10.1007/s12652-020-01797-3
10.1186/s13638-019-1564-4
10.1007/s11036-008-0145-2
10.3390/electronics10141635
10.1186/1687-1499-2012-97
10.1007/s10776-021-00505-y
10.1007/b95439
10.12720/jcm.14.2.110-120
10.1109/ACCESS.2020.3006043
10.1002/ett.4432
10.1016/j.jpdc.2012.04.007
10.1002/ett.4446
10.1109/TMC.2018.2828814
10.1145/513800.513828
10.5121/ijasuc.2021.12201
10.48084/etasr.1810
10.1007/978-3-540-78773-0_31
10.1007/978-3-030-66222-6_12
10.1109/JCN.2014.000066
10.1007/978-0-387-35612-9_9
10.1109/JSAC.2007.070805
10.1002/itl2.355
10.1016/j.jnca.2021.103118
ContentType Journal Article
Copyright 2023 John Wiley & Sons, Ltd.
Copyright_xml – notice: 2023 John Wiley & Sons, Ltd.
DBID AAYXX
CITATION
DOI 10.1002/ett.4858
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 2161-3915
EndPage n/a
ExternalDocumentID 10_1002_ett_4858
ETT4858
Genre researchArticle
GroupedDBID .GA
.Y3
05W
1OC
31~
50Z
8-0
8-1
8-3
8-4
8-5
930
A03
AAEVG
AAHHS
AAHQN
AAMNL
AANHP
AANLZ
AAXRX
AAYCA
AAZKR
ABCUV
ACAHQ
ACBWZ
ACCFJ
ACCZN
ACPOU
ACRPL
ACXBN
ACXQS
ACYXJ
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADNMO
ADOZA
ADXAS
ADZMN
AEEZP
AEGXH
AEIGN
AEIMD
AENEX
AEQDE
AEUQT
AEUYR
AFBPY
AFFPM
AFGKR
AFPWT
AFWVQ
AFZJQ
AHBTC
AITYG
AIURR
AIWBW
AJBDE
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZFZN
BDRZF
BFHJK
BHBCM
BMNLL
BMXJE
BRXPI
D-E
D-F
DCZOG
DPXWK
DRFUL
DRSTM
EBS
EJD
F00
F01
F04
F21
G-S
GODZA
HGLYW
IN-
LATKE
LEEKS
LH4
LITHE
LOXES
LUTES
LW6
LYRES
MEWTI
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
RX1
SUPJJ
V2E
WIH
WIK
WXSBR
AAYXX
ADMLS
AGHNM
AGQPQ
AGYGG
CITATION
ID FETCH-LOGICAL-c2998-fb98f7bab9c957c60f450d64725c30510eb067a0483708f0fc60a3a677e8575a3
ISSN 2161-3915
IngestDate Tue Jul 01 03:49:30 EDT 2025
Thu Apr 24 23:08:28 EDT 2025
Wed Jan 22 16:15:36 EST 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 12
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c2998-fb98f7bab9c957c60f450d64725c30510eb067a0483708f0fc60a3a677e8575a3
OpenAccessLink https://onlinelibrary.wiley.com/doi/pdfdirect/10.1002/ett.4858
PageCount 24
ParticipantIDs crossref_citationtrail_10_1002_ett_4858
crossref_primary_10_1002_ett_4858
wiley_primary_10_1002_ett_4858_ETT4858
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate December 2023
2023-12-00
PublicationDateYYYYMMDD 2023-12-01
PublicationDate_xml – month: 12
  year: 2023
  text: December 2023
PublicationDecade 2020
PublicationTitle Transactions on emerging telecommunications technologies
PublicationYear 2023
References 2009; 22
2019; 2019
2012; 2012
2005; 177
2010
2021; 28
2000; 8
2019; 14
2020; 11
2019; 107
2002
2016; 16
2021;13:1‐15
2012; 72
2022; 100
2020; 7
2009; 14
2018; 18
2018; 8
2021; 10
2018; 2
2021; 12
2021; 33
2022
2000
2021
2022; 5
2002; 100
2014; 16
2019
2018
2014; 39
2022; 33
2008; 4957
2007; 25
2021; 190
2020; 29
e_1_2_8_28_1
e_1_2_8_29_1
e_1_2_8_24_1
e_1_2_8_25_1
e_1_2_8_26_1
e_1_2_8_3_1
e_1_2_8_2_1
e_1_2_8_5_1
e_1_2_8_4_1
e_1_2_8_6_1
e_1_2_8_9_1
e_1_2_8_8_1
Mahmoud ME (e_1_2_8_35_1) 2010
e_1_2_8_20_1
e_1_2_8_21_1
Arora DKK (e_1_2_8_27_1) 2020; 29
e_1_2_8_42_1
e_1_2_8_22_1
e_1_2_8_23_1
Joachims T (e_1_2_8_40_1) 2000
e_1_2_8_41_1
e_1_2_8_18_1
e_1_2_8_19_1
Mangayarkarasi R (e_1_2_8_16_1) 2020; 7
e_1_2_8_13_1
e_1_2_8_36_1
e_1_2_8_14_1
e_1_2_8_15_1
e_1_2_8_38_1
e_1_2_8_37_1
Mohamed HE‐D (e_1_2_8_7_1) 2021
Dutt S (e_1_2_8_39_1) 2018
Folayo Aina SY (e_1_2_8_17_1) 2018
e_1_2_8_32_1
e_1_2_8_10_1
e_1_2_8_31_1
e_1_2_8_11_1
e_1_2_8_34_1
e_1_2_8_12_1
e_1_2_8_33_1
e_1_2_8_30_1
References_xml – start-page: 1
  year: 2010
  end-page: 5
– start-page: 869
  year: 2022
  end-page: 876
– volume: 16
  start-page: 371
  year: 2014
  end-page: 377
  article-title: An energy efficient localized topology control algorithm for wireless multihop networks
  publication-title: J Commun Netw
– volume: 10
  year: 2021
  article-title: A novel anomaly behavior detection scheme for mobile ad hoc networks
  publication-title: Electronics
– start-page: 104
  year: 2018
  end-page: 109
– volume: 12
  start-page: 1
  year: 2021
  end-page: 14
  article-title: Optimum neighbors for resource‐constrained mobile ad hoc networks
  publication-title: Int J Ad Hoc Sens Ubiquitous Comput
– volume: 7
  start-page: 148
  year: 2020
  end-page: 154
  article-title: Cost effective collaborative anomaly detection system for selfish node attacks in MANET
  publication-title: J Crit Rev
– volume: 2019
  year: 2019
  article-title: Selfish node detection based on hierarchical game theory in IoT
  publication-title: EURASIP J Wirel Commun Netw
– start-page: 1
  year: 2019
  end-page: 6
– volume: 16
  start-page: 1708
  year: 2016
  end-page: 1715
  article-title: Data reduction in wireless sensor networks: a hierarchical LMS prediction approach
  publication-title: IEEE Sens J
– volume: 100
  start-page: 107
  year: 2002
  end-page: 121
– volume: 8
  start-page: 124097
  year: 2000
  end-page: 124109
  article-title: A game theory‐based strategic approach to ensure reliable data transmission with optimized network operations in futuristic mobile adhoc networks
  publication-title: IEEE Access
– year: 2000
– volume: 33
  year: 2022
  article-title: Improving routing disruption attack detection in MANETs using efficient trust establishment
  publication-title: Trans Emerg Telecommun Technol
– volume: 5
  issue: 3
  year: 2022
  article-title: IoT‐Pi: a machine learning‐based lightweight framework for cost‐effective distributed computing using IoT
  publication-title: Internet Technol Lett
– start-page: 175
  year: 2021
  end-page: 188
– year: 2021;13:1‐15
  article-title: Using MANET in IoT healthcare applications: a survey
  publication-title: Int J Comput Digit Syst
– year: 2018
– volume: 33
  year: 2021
  article-title: Autoregressive moving average based anycast with support vector machine clustering in mobile ad‐hoc networks
  publication-title: Trans Emerg Telecommun Technol
– volume: 100
  year: 2022
  article-title: Autonomous detection of malevolent nodes using secure heterogeneous cluster protocol
  publication-title: Comput Electr Eng
– volume: 22
  issue: 7
  year: 2009
  article-title: Eeaodr: an energy ficient ad hoc on‐demand routing protocol for mobile ad hoc networks
  publication-title: Int J Commun Syst
– volume: 29
  start-page: 279
  year: 2020
  end-page: 289
  article-title: A study on attacks in mobile ad‐hoc networks
  publication-title: J Netw Comput Appl
– volume: 14
  start-page: 178
  issue: 2
  year: 2009
  end-page: 187
  article-title: OMH—suppressing selfish behavior in ad hoc networks with one more hop
  publication-title: Mob Netw Appl
– volume: 25
  start-page: 1101
  issue: 6
  year: 2007
  end-page: 1112
  article-title: Non‐cooperative power control for wireless ad hoc networks with repeated games
  publication-title: IEEE J Sel Areas Commun
– volume: 2012
  year: 2012
  article-title: Adaptive neighbor‐based topology control protocol for wireless multi‐hop networks
  publication-title: EURASIP J Wirel Commun Netw
– volume: 18
  start-page: 42
  issue: 1
  year: 2018
  end-page: 55
  article-title: An evolutionary self‐cooperative trust scheme against routing disruptions in MANETs
  publication-title: IEEE Trans Mob Comput
– start-page: 226
  year: 2002
  end-page: 236
– volume: 14
  start-page: 110
  issue: 2
  year: 2019
  end-page: 120
  article-title: Survey of recent routing metrics and protocols for mobile ad‐hoc networks
  publication-title: J Commun
– volume: 8
  start-page: 2604
  issue: 1
  year: 2018
  end-page: 2608
  article-title: MANETs and Internet of Things: the development of a data routing algorithm
  publication-title: Eng Technol Appl Sci Res
– volume: 107
  start-page: 2191
  issue: 4
  year: 2019
  end-page: 2209
  article-title: Energy and velocity based tree multicast routing in mobile ad‐hoc networks
  publication-title: Wirel Pers Commun
– start-page: 114
  year: 2018
  end-page: 119
– volume: 72
  start-page: 1032
  year: 2012
  end-page: 1044
  article-title: A new distributed topology control algorithm based on optimization of delay and energy in wireless networks
  publication-title: J Parallel Distrib Comput
– volume: 39
  start-page: 891
  year: 2014
  end-page: 901
  article-title: Experience based energy efficient reactive routing protocol (EXERP) for mobile ad‐hoc networks
  publication-title: Arab J Sci Eng
– volume: 190
  year: 2021
  article-title: Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: a comprehensive review
  publication-title: J Netw Comput Appl
– volume: 28
  start-page: 199
  year: 2021
  end-page: 216
  article-title: Arma model based anycast AODV (ARMA‐AAODV) for performance improvement in scalable mobile ad hoc networks
  publication-title: Int J Wirel Inf Netw
– volume: 11
  start-page: 4995
  year: 2020
  end-page: 5001
  article-title: Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks
  publication-title: J Ambient Intell Humaniz Comput
– volume: 2
  start-page: 651
  year: 2018
  end-page: 671
– volume: 4957
  start-page: 350
  year: 2008
  end-page: 361
– volume: 177
  year: 2005
– ident: e_1_2_8_2_1
  doi: 10.1109/FiCloud.2018.00024
– ident: e_1_2_8_8_1
  doi: 10.1007/s11277-019-06378-y
– ident: e_1_2_8_24_1
  doi: 10.1109/JSEN.2015.2504106
– ident: e_1_2_8_29_1
  doi: 10.1007/s13369-013-0813-9
– ident: e_1_2_8_37_1
  doi: 10.1109/ICACCCN.2018.8748632
– ident: e_1_2_8_5_1
  doi: 10.1007/978-981-16-7469-3_96
– ident: e_1_2_8_30_1
  doi: 10.1002/dac.991
– ident: e_1_2_8_14_1
– ident: e_1_2_8_18_1
  doi: 10.1109/ITNAC46935.2019.9077968
– ident: e_1_2_8_33_1
  doi: 10.1016/j.compeleceng.2022.107902
– ident: e_1_2_8_10_1
  doi: 10.1007/s12652-020-01797-3
– ident: e_1_2_8_15_1
  doi: 10.1186/s13638-019-1564-4
– ident: e_1_2_8_13_1
  doi: 10.1007/s11036-008-0145-2
– ident: e_1_2_8_31_1
  doi: 10.3390/electronics10141635
– ident: e_1_2_8_22_1
  doi: 10.1186/1687-1499-2012-97
– ident: e_1_2_8_26_1
  doi: 10.1007/s10776-021-00505-y
– ident: e_1_2_8_38_1
  doi: 10.1007/b95439
– ident: e_1_2_8_3_1
  doi: 10.12720/jcm.14.2.110-120
– year: 2021
  ident: e_1_2_8_7_1
  article-title: Using MANET in IoT healthcare applications: a survey
  publication-title: Int J Comput Digit Syst
– ident: e_1_2_8_42_1
  doi: 10.1109/ACCESS.2020.3006043
– ident: e_1_2_8_36_1
– volume-title: Machine Learning
  year: 2018
  ident: e_1_2_8_39_1
– start-page: 651
  volume-title: 2018 In Book: Proceedings of the Future Technologies Conference (FTC)
  year: 2018
  ident: e_1_2_8_17_1
– ident: e_1_2_8_9_1
  doi: 10.1002/ett.4432
– volume: 7
  start-page: 148
  year: 2020
  ident: e_1_2_8_16_1
  article-title: Cost effective collaborative anomaly detection system for selfish node attacks in MANET
  publication-title: J Crit Rev
– ident: e_1_2_8_23_1
  doi: 10.1016/j.jpdc.2012.04.007
– volume-title: Training Linear SVMs in Linear Time
  year: 2000
  ident: e_1_2_8_40_1
– ident: e_1_2_8_32_1
  doi: 10.1002/ett.4446
– ident: e_1_2_8_28_1
  doi: 10.1109/TMC.2018.2828814
– ident: e_1_2_8_20_1
  doi: 10.1145/513800.513828
– ident: e_1_2_8_41_1
  doi: 10.5121/ijasuc.2021.12201
– ident: e_1_2_8_6_1
  doi: 10.48084/etasr.1810
– ident: e_1_2_8_21_1
  doi: 10.1007/978-3-540-78773-0_31
– ident: e_1_2_8_4_1
  doi: 10.1007/978-3-030-66222-6_12
– volume: 29
  start-page: 279
  year: 2020
  ident: e_1_2_8_27_1
  article-title: A study on attacks in mobile ad‐hoc networks
  publication-title: J Netw Comput Appl
– ident: e_1_2_8_25_1
  doi: 10.1109/JCN.2014.000066
– start-page: 1
  volume-title: Proceedings of the IEEE GlobeCom
  year: 2010
  ident: e_1_2_8_35_1
– ident: e_1_2_8_19_1
  doi: 10.1007/978-0-387-35612-9_9
– ident: e_1_2_8_12_1
  doi: 10.1109/JSAC.2007.070805
– ident: e_1_2_8_34_1
  doi: 10.1002/itl2.355
– ident: e_1_2_8_11_1
  doi: 10.1016/j.jnca.2021.103118
SSID ssj0000752548
Score 2.3154263
Snippet The communication between nodes in the Internet of Things‐based mobile ad‐hoc networks environment is typically dependent on their selfless attitude. Whenever...
SourceID crossref
wiley
SourceType Enrichment Source
Index Database
Publisher
Title Efficient selfish node detection using SVM in IoT‐MANET environment
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fett.4858
Volume 34
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELaW7QUOiKcoLxkJwaHKknWch48LBApie9kU9RbZjqNtqbLVbnJoT_wEfiO_hLGduG61SIVLdmU53pXnkzMz-WY-hF7TWAgSVZqqI8OAVrwKMlbLIAylpCqOE4jmNNviINk_pF-P4qPR6NxjLXWtmMiLrXUl_2NVGAO76irZf7CsWxQG4DvYF65gYbjeyMa56f-g3-Zv1GmtexM1q0oXQrXKKoB3JhOw-D7XaY0vq8JRG-azg7zwq9x8J7W41BA3LxN0DbHRMmq1aI5fUbLZa4fUvEdG_LxcbZaW8iOWvPnBHQH4PW_U-sRyf2ZNt-bV0j0WFl19bLOxM9G5pboz694uDOlzzzDC_UwFiTzWhznQyFTnupgt35yoLWP9idynN3vkka0nve0cq9p2QjPb_P1qM-1rDzlHPbRtmkkJd5b6zltoh0CEQcZoZ_Zx_m3hEnTgS0HwbBQNh_84NC8Oybvhh6-4M354Y_yT4h662wcWeGZRch-NVPMA3fHaTT5EucML7vGCNV6wwws2eMGAF3zcYMDL75-_DFKwh5RH6PBTXnzYD3oZjUASXUBZC5bVqeCCSRanMglrGoeVlg2IZaTPZCXAZeFGWyDM6rCGKTziSZoqLd_Ko8do3Kwa9QRhRpmoJMumMI8KwgRlqVTgUXJa86lIdtHbYTdK2feY11Inp-X1bd9Fr9zMM9tXZcucN2ZD_zqhzItCfz69wWLP0O1LTD5H43bdqRfgT7biZW_5P-0deKA
linkProvider EBSCOhost
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Efficient+selfish+node+detection+using+SVM+in+IoT%E2%80%90MANET+environment&rft.jtitle=Transactions+on+emerging+telecommunications+technologies&rft.au=Ghosh%2C+Subhankar&rft.au=Banerjee%2C+Anuradha&rft.au=Sufian%2C+Abu&rft.au=Gupta%2C+Sachin+Kumar&rft.date=2023-12-01&rft.issn=2161-3915&rft.eissn=2161-3915&rft.volume=34&rft.issue=12&rft_id=info:doi/10.1002%2Fett.4858&rft.externalDBID=n%2Fa&rft.externalDocID=10_1002_ett_4858
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2161-3915&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2161-3915&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2161-3915&client=summon