Watchdog malicious node detection and isolation using deep learning for secured communication in MANET

AS Narmadha, S Maheswari, SN Deepa - Automatika: časopis za …, 2023 - hrcak.srce.hr
Sažetak Mobile Ad-hoc Networks (MANETs) are wireless networks formed dynamically by
connecting or leaving nodes to and from the network without any fixed infrastructure. These …

[PDF][PDF] Accountability of WMNs using BEB Algorithm

S Jasuja, P Singh - … Journal of Innovations in Engineering and …, 2015 - academia.edu
Wireless mesh networks (WMNs) has the ability of dynamic self-organization, self-
configuration and selfhealing. These features facilitate quick deployment, easy …

An Efficient Authentication Protocol for Wireless Mesh Networks

P Zhai, J He, N Zhu, P He… - Journal of Web …, 2020 - ieeexplore.ieee.org
In a wireless mesh network (WMN), how to guarantee safe access to sensitive information
has been an issue under research partly because of various hidden attacks and attack …

[PDF][PDF] Preventing & Isolating Distributed Denial of Service (DDOS) attack in Wireless Mesh Networks (WMN's)

A Hassan, R Sharma, G Singh - academia.edu
Wireless Mesh networks (WMN's) are prone to a number of attacks & these attacks
compromise the security of these networks. Attaining security in these networks is a …

[PDF][PDF] Detecting and denying malicious behavior using adaptive learning based routing protocols in wireless mesh network

R Regan, JML Manickam - Appl. Math, 2017 - naturalspublishing.com
Wireless Mesh Network (WMN) is a self organization and self configuration network which
provides fast internets based on hybrid network. WMN consists of mesh nodes and mesh …

An efficient DSR protocol to detect blackhole attacks in WMN using cross layer approach

R Thillaikarasi, SMS Bhanu - Wireless Personal Communications, 2017 - Springer
Constructing an efficient and secured Wireless Mesh Network is a challenging issue due to
its physical channel vulnerability and dynamic change of topology. In this network, attacks …

RTS: A robust and trusted scheme for IoT-based mobile wireless mesh networks

K Haseeb, IU Din, A Almogren, N Islam… - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless mesh networks consist of various mesh clients that are organized in an unfixed
infrastructure and packets are forwarded using a multi-hop model. Routing protocols have a …

Optimised with secure approach in detecting and isolation of malicious nodes in MANET

R Thiagarajan, R Ganesan, V Anbarasu… - Wireless Personal …, 2021 - Springer
To keep the process of routing and data transmission operations, it's needed for a proper
layer of security to keep it safe from malicious attacks. So in this paper, we proposed a …

An effective attack detection approach in wireless mesh networks

FB Abreu, A Morais, A Cavalli… - … Journal of Space …, 2015 - inderscienceonline.com
Wireless mesh network (WMN) is a recent technology that is gaining significant importance
among traditional wireless networks. It is considered a suitable solution for providing internet …

[PDF][PDF] A comprehensive mechanism of MANET network layer based security attack prevention

MS Shaik, F Mira - International Journal of Wireless and …, 2020 - scholar.archive.org
The infrastructure benefits, which are achieved from the MANET architecture is the prime
reason for the increase in usage for various purposes. The MANET architecture is made truly …