Hybrid cluster-based geographical routing protocol to mitigate malicious nodes in mobile ad hoc network

S Sudhakar, SC Pandian - International Journal of Ad Hoc …, 2016 - inderscienceonline.com
… Hence, early MANET research focused on providing routing … Most of the routing protocols
assume that the nodes in the … , a malicious node can launch attacks disrupting routing

Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks

V Gomathy, N Padhy, D Samanta, M Sivaram… - Journal of Ambient …, 2020 - Springer
… cluster based secure routing scheme provides … malicious nodes presence in wireless Adhoc
network. The simulation result shows that the proposed model is detect the malicious nodes

[PDF][PDF] An enhanced trust-based secure route protocol for malicious node detection

SN Pari, K Sudharson - Intelligent Automation & Soft …, 2023 - pdfs.semanticscholar.org
protocol can only accept an alternating route with a lower hop count due to the confidentiality
requirement. In [3], a secure method of routing protocol for MANET protects the routing

Secure routing protocol with malicious nodes detection for ad hoc networks

CH Lin, WS Lai, YL Huang… - … Conference on Advanced …, 2008 - ieeexplore.ieee.org
… Ad hoc network routing protocols are challenging to design, and secure ones are even more…
protocol [1], an ad hoc on-demand secure routing protocol, in which it can withstand node

Malicious node analysis in MANETS

T Jamal, SA Butt - International Journal of Information Technology, 2019 - Springer
… So as to recognize and moderate the black hole attack, it is important to comprehend the
routing protocol execution; along these lines, in next segment we study about the AODV in detail…

Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption

S Umang, BVR Reddy, MN Hoda - IET communications, 2010 - IET
… We assess the proposed approach for malicious node detection in MANETs and compare it
with the existing routing protocol AODV in MANET using simulations. We have simulated our …

A multipath secure routing protocol based on malicious node detection

Y Lan, L Lei, G Fuxiang - 2009 Chinese Control and Decision …, 2009 - ieeexplore.ieee.org
… safety in routing layer for a WSN. In this paper, a multipath secure routing protocol for flat
network-… Furthermore, malicious nodes will be detected out and isolates. Experiments show that …

Reputation-based opportunistic routing protocol using q-learning for manet attacked by malicious nodes

J Ryu, S Kim - IEEE Access, 2023 - ieeexplore.ieee.org
… effect of malicious nodes on packet transmission. In this study, we propose a new reinforcement
learning routing protocol for MANETs called reputation opportunistic routing based on Q-…

A distributed prevention scheme from malicious nodes in VANETs' routing protocols

T Bouali, H Sedjelmaci… - 2016 IEEE Wireless …, 2016 - ieeexplore.ieee.org
… of our proposed mechanism to detect malicious nodes, then, we highlight its impact on
the end-to-end delay, delivery ratio and generated overhead in a malicious environment. …

The advanced wireless sensor networks' routing protocol to detect malicious nodes and behavior

A Arab - Journal of the Chinese Institute of Engineers, 2023 - Taylor & Francis
… deceive systems with incompatible behaviors, but this protocol detects them. This paper
introduces fuzzy energy and a reliable routing protocol, FETRP, to solve problems. The protocol