[PDF][PDF] POWER AWARE AND SECURED ROUTING PROTOCOL IN MOBILE-HOC NETWORK: AD A SURVEY

OM Olaniyan, BA Omodunbi, E Adebimpe… - Technology, 2020 - academia.edu
… optimization for a multicast routing algorithm in MANET. This … ) for selecting optimal routes
to group nodes for multicasting. In … This technique detects stealthy attack and it is isolated from …

[PDF][PDF] A comprehensive survey on routing and security in mobile wireless sensor networks

A Al-Nasser, R Almesaeed… - International Journal of …, 2021 - journals.pan.pl
… -art MWSN routing protocols and their enhanced variants are … The algorithm is based on
swarm intelligence and benefits from … Passive attacks are designed to be stealthy to achieve the …

[HTML][HTML] Efficient mobile ad hoc route maintenance against social distances using attacker detection automation

U Allimuthu, K Mahalakshmi - Mobile Networks and Applications, 2023 - Springer
… safeguards against Routing Protocols. The Rushing Attacker has significantly influenced
MANET packet-… This routing strategy aids in the secure and intelligent discovery of the best …

Comprehensive survey of routing protocols for wireless body area networks (WBANs)

A Raza, P Kumar, A Ahmed, UA Khan - … the Conventional to Digital, 2020 - igi-global.com
… Telemedicine, smart homes, smart apartments are some … understand localization issues
and their countermeasures. … The combined approach of secure multicast mechanism and trust …

Sybil attack in RPL-based internet of things: Analysis and defenses

C Pu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
… models of the RPL routing protocol, LLNs become an ideal … envision that wirelessly connected
smart devices in the realm of … -based approach against stealthy collision attack in EHNets […

[HTML][HTML] A Comprehensive Survey of Cybersecurity Threats, Attacks, and Effective Countermeasures in Industrial Internet of Things

AM Alnajim, S Habib, M Islam, SM Thwin, F Alotaibi - Technologies, 2023 - mdpi.com
inside these partially structured facilities if intelligent factories… ring (RLR) procedure, followed
by a sneaky sensor threat, to … inside the Class A to Class C address spaces, IPv4 multicast, …

A survey on space-air-ground-sea integrated network security in 6G

H Guo, J Li, J Liu, N Tian, N Kato - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
… on cross-layer attacks and security countermeasure in SAGSIN, and … intelligent traffic control,
intelligent Resource Allocation, … Besides, geographic routing protocols are more popular in …

A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls

G Uçtu, M Alkan, İA Doğru, M Dörterler - Future Generation Computer …, 2021 - Elsevier
intelligence such as surveillance system, itrouting protocol against worm attacks. Intrusion
detection [41] in networks called MANET (mobile ad hoc networks) which also uses multicast

Big picture: Analysis of DDoS attacks map-systems and network, cloud computing, SCADA systems, and IoT

S Salah, BM Amro - International Journal of Internet …, 2022 - inderscienceonline.com
… learning, data mining, MANETs, routing protocols, e-leaning, … and intelligence are not
streamlined; the intelligence which is … Examples of such attacks are DNS flood and Stealth/Slow …

[HTML][HTML] Classification of network slicing threats based on slicing enablers: A survey

MJK Abood, GH Abdul-Majeed - International Journal of Intelligent …, 2023 - Elsevier
… system deployment" [57] are two examples of potential attacks specific to this environment.
Table (8) contains the summarization of the attack against VM and its countermeasures. …