Retraction
Optimised with Secure Approach in Detecting and Isolation of Malicious Nodes in MANET
Paper Information
Record ID:
42599
Author(s):
Journal:
Publication Date:
January 24, 2021
Retraction Date:
December 06, 2022
(3.0 years years ago)
Subjects:
Institutions:
- Department of Computer Science and Engineering, Prathyusha Engineering College, Chennai, Tamil Nadu, India
- Department of Computer Science and Engineering, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, Kattankulathur, Chengalpattu, Chennai, Tamil Nadu, 603 203, India
Country:
🇮🇳 IndiaArticle Type:
Publisher:
Springer
Open Access:
Yes
PubMed ID:
Not indexed in PubMed
Retraction PubMed ID:
Not indexed in PubMed
Retraction Details
Citations (27)
27
Total Citations6
Post-Retraction(22.2%)
21
Pre-Retraction0
Same DayPost-Retraction Citation Analysis
0
Within 30 days
3
Within 1 year
0
After 2+ years
511
Days since retraction (latest)
Detecting Intruder and Black Hole Attackers in Mobile Adhoc Network
S. Hemalatha, Maddala Janakidevi, Pullela SVVSR Kumar et al. (8 authors)
International Journal of Electronics and Communication Engineering
Open Access
Published: Apr 2024
511 days after retraction
Hybrid Bayesian and modified grey PROMETHEE-AL model-based trust estimation technique for thwarting malicious and selfish nodes in MANETs
J. Suresh, J. Martin Sahayaraj, B. R. Rajakumar et al. (4 authors)
Wireless Networks
Published: Jan 2024
3 citations
3 citations
392 days after retraction
APPROACHES FOR SOLVING ROUTING AND SECURITY ISSUES IN MOBILE AD-HOC NETWORKS (MANETs): A REVIEW
RAJI R. O, Akinyemi Moruff OYELAKIN
Journal of Information Technology and Computing
Open Access
Published: Dec 2023
2 citations
2 citations
389 days after retraction
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET
R Reka, R. Karthick, Reshma Ram et al. (4 authors)
Computers & Security
Published: Oct 2023
50 citations
50 citations
303 days after retraction
Securing biomedical databases based on fuzzy method through blockchain technology
Ramya Thatikonda, Srinivas Aditya Vaddadi, Pandu Ranga Rao Arnepalli et al. (4 authors)
Soft Computing
Published: May 2023
8 citations
8 citations
171 days after retraction
Secure Routing Protocol to Mitigate Attacks by using Blockchain Technology in MANET
Nitesh Ghodichor, Raj Thaneeghavl, Dinesh Kumar Sahu et al. (5 authors)
International journal of Computer Networks & Communications
Open Access
Published: Mar 2023
5 citations
5 citations
114 days after retraction
An intelligent IOT sensor coupled precision irrigation model for agriculture
G.S. Prasanna Lakshmi, P.N. Asha, G. Sandhya et al. (6 authors)
Measurement Sensors
Open Access
Published: Dec 2022
50 citations
50 citations
1 days before retraction
An effectual IOT coupled EEG analysing model for continuous patient monitoring
Simran Khiani, M. Mohamed Iqbal, Amol Dhakne et al. (6 authors)
Measurement Sensors
Published: Nov 2022
15 citations
15 citations
11 days before retraction
High gain couple feed multiband wearable antenna for <scp>5G</scp> and sub‐6 <scp>GHz</scp> communications
Tale Saeidi, Saeid Karamzadeh
International Journal of RF and Microwave Computer-Aided Engineering
Open Access
Published: Oct 2022
2 citations
2 citations
49 days before retraction
Timer Entrenched Baited Scheme to Locate and Remove Attacks in MANET
S. Padmapriya, R. Shankar, R. Thiagarajan et al. (6 authors)
Intelligent Automation & Soft Computing
Open Access
Published: Jun 2022
183 days before retraction
Metamaterial-Based Circularly Polarized Wearable Antenna for ISM and 5G Communications
Tale Saeidi, Melih Gokdemir, Saeid Karamzadeh
2022 30th Signal Processing and Communications Applications Conference (SIU)
Published: May 2022
5 citations
5 citations
205 days before retraction
Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs
S. Jagatheswari, RVS Praveen, J. Chandra Priya
International Journal of Information Technology
Published: Feb 2022
25 citations
25 citations
302 days before retraction
A High Energy Efficient Approach for Handling Dynamic Network Using AOMDV Routing Protocol
R Thiagarajan, B Gunasundari, S Padmapriya et al. (6 authors)
2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)
Published: Dec 2021
1 citation
1 citation
354 days before retraction
Pothole Detection Using Arduino and Ultrasonic Sensors
T. S. Arulananth, M. Baskar, K. Thrishma et al. (6 authors)
Lecture notes in networks and systems
Published: Aug 2021
2 citations
2 citations
491 days before retraction
Physical Features Based Authentication Technique and Key Management for IoT Networks
C. Santhanakrishnan, K. Annapurani, S. Pradeep et al. (5 authors)
Wireless Personal Communications
Published: Jul 2021
7 citations
7 citations
511 days before retraction
RETRACTED ARTICLE: Smart communication using tri-spectral sign recognition for hearing-impaired people
B. Kanisha, V. Mahalakshmi, M. Baskar et al. (5 authors)
The Journal of Supercomputing
Published: Jul 2021
18 citations
18 citations
519 days before retraction
Fisher-Yates Chaotic Shuffling Based Visual Cryptography Scheme for Multimodal Biometric Authentication
M. Gayathri, C. Malathy
Wireless Personal Communications
Published: Jun 2021
4 citations
4 citations
524 days before retraction
Hybrid Fabric Wearable Antenna Design and Evaluation for High Speed 5G Applications
T. Rubesh Kumar, M. Moorthi
Wireless Personal Communications
Published: Jun 2021
5 citations
5 citations
524 days before retraction
An intelligent web service group-based recommendation system for long-term composition
P. Kirubanantham, S. M. Udhaya Sankar, C. Amuthadevi et al. (6 authors)
The Journal of Supercomputing
Published: Jun 2021
20 citations
20 citations
533 days before retraction
Accomplishment of Reversible Logic Gates in WSN Environment by Patternization
M. Kirankumar, M. Santhi
Wireless Personal Communications
Published: May 2021
566 days before retraction
A Heuristic K-Anonymity Based Privacy Preserving for Student Management Hyperledger Fabric blockchain
B. Sowmiya, E. Poovammal
Wireless Personal Communications
Published: May 2021
17 citations
17 citations
567 days before retraction
An Intelligent Centrality Measures for Influential Node Detection in COVID-19 Environment
J. Jeyasudha, G. Usha
Wireless Personal Communications
Open Access
Published: May 2021
9 citations
9 citations
572 days before retraction
Adversarial Attack by Inducing Drift in Streaming Data
B. Ida Seraphim, E. Poovammal
Wireless Personal Communications
Published: Apr 2021
2 citations
2 citations
593 days before retraction
People-centric collective intelligence: decentralized and enhanced privacy mobile crowd sensing based on blockchain
M. Arulprakash, R. Jebakumar
The Journal of Supercomputing
Published: Apr 2021
27 citations
27 citations
606 days before retraction
BBSSE: Blockchain-Based Safe Storage, Secure Sharing and Energy Scheme for Smart Grid Network
G. Vasukidevi, T. Sethukarasi
Wireless Personal Communications
Published: Apr 2021
13 citations
13 citations
608 days before retraction
Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution
A. Saranya, R. Naresh
Neural Processing Letters
Published: Mar 2021
23 citations
23 citations
619 days before retraction
Trust Model for IoT Using Cluster Analysis: A Centralized Approach
S. Feslin Anish Mon, S. Godfrey Winster, R. Ramesh
Wireless Personal Communications
Published: Mar 2021
20 citations
20 citations
619 days before retraction
Quick Stats
Total Citations:
27
Years Since Retraction:
3.0 years
Open Access:
Yes
Last Checked:
Jul 24, 2025