Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis

DP Acharjya, NSS Ahmed - Peer-to-Peer Networking and Applications, 2021 - Springer
concept analysis (DRSFCA) to detect various assaults in 5G, beyond 5G, and IoE network. In
… Further, these rules are used in formal concept analysis to find chief features that create an …

MANET-Rank: A Framework for Defence Protocols against Packet Dropping Attacks in MANETs

C Hutchins, L Aniello, E Gerding… - … -2024 IEEE Network …, 2024 - ieeexplore.ieee.org
MANET-Rank, which uses empirical game theoretic analysis and bootstrapping to assess the
effectiveness of defence protocols in ad hoc networks… rd(sd), we borrow a concept from the …

[PDF][PDF] A review on key management schemes in MANET

R Dalal, Y Singh, M Khari - International Journal of Distributed and …, 2012 - academia.edu
… When the mobile ad-hoc network is constructed, this scheme is using the concept of CA …
The key is generated by this model are accepted by self organized network (MANET) and partial …

Leveraging MANET-based cooperative cache discovery techniques in VANETs: A survey and analysis

S Glass, I Mahgoub, M Rathod - IEEE Communications Surveys …, 2017 - ieeexplore.ieee.org
… Future research can utilize the results of this analysis to develop novel cooperative caching
schemes that will offer better performance within VANETs when compared to existing MANET

A fully distributed IDS for MANET

R Puttini, JM Percher, L Mé… - Proceedings. ISCC 2004 …, 2004 - ieeexplore.ieee.org
In This work we propose a new distributed intrusion detection system (IDS) designed for
mobile ad hoc network (MANET) environments. The complete distribution of the intrusion …

Hybrid scheme to enable DTN routing protocols to efficiently exploit stable MANET contacts

S Krug, M Aumüller, J Seitz - … Wireless Communications and Networking, 2018 - Springer
… In this section, we will present our concept to enable effective utilization of stable layer 3
contacts via a hybrid interaction of the DTN and MANET instances of a node. To achieve that, …

Network forensics in MANET: traffic analysis of source spoofed DoS attacks

Y Guo, M Simon - … Fourth International Conference on Network …, 2010 - ieeexplore.ieee.org
… intuitive examples to conceptually demonstrate how DF behave in normal network and ASF
… Fig.1 conceptually illustrate how DF behaves in the normal network and ASF attack scenarios…

A review of current routing attacks in mobile ad hoc networks

R Hafeez, MA Ngadi… - … Science and Network …, 2008 - researchoutput.csu.edu.au
network (MANET) is a dynamic wireless network that can be formed without any pre-existing
infrastructure in which each node can act as a router. MANET … based on the concept of link …

Issues in integrating cellular networks WLANs, AND MANETs: a futuristic heterogeneous wireless network

D Cavalcanti, D Agrawal, C Cordeiro… - IEEE Wireless …, 2005 - ieeexplore.ieee.org
… hoc network (MANET), which consists of wireless devices that serve as routers. In a MANET,
… Although devices in a MANET often communicate through the WLAN/WPAN interfaces, the …

Mobile ad-hoc network (MANET) for disaster management

SS Jadhav, AV Kulkarni… - … Communications Networks …, 2014 - ieeexplore.ieee.org
… The first reactive protocol which was proposed is called as Dynamic source routing protocol
which had goal of imposes the routing mechanism in MANET network which size up to the …