[PDF][PDF] A novel intrusion detection model for mobile ad-hoc networks using CP-KNN

M Lalli, V Palanisamy - International Journal of Computer Networks …, 2014 - academia.edu
Mobile ad-hoc network security problems are the subject of in depth analysis. A group of
mobile nodes area unit connected to a set wired backbone. In MANET, the node themselves …

[引用][C] A survey of trust management in mobile ad hoc networks

R Vijayan, N Jeyanthi - International Journal of Applied Engineering Research, 2016

Neighbor node trust based intrusion detection system for WSN

SM Sajjad, SH Bouk, M Yousaf - Procedia Computer Science, 2015 - Elsevier
Timely detection of anomalous activity in wireless sensor network is critical for the smooth
working of the network. This paper presents an intrusion detection technique based on the …

Hybrid DNN-BiLSTM-aided intrusion detection and trust-clustering and routing-based intrusion prevention system in VANET

PV Sontakke, NB Chopade - Journal of Control and Decision, 2023 - Taylor & Francis
This paper focuses on developing an intrusion prevention and detection Vehicular Ad Hoc
Network system by expert systems. The node data are composed of online sources. The …

[HTML][HTML] Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks

J VS, M MSK - EURASIP Journal on Wireless Communications and …, 2018 - Springer
In mobile ad hoc networks (MANETs), the reliability of nodes, quality of data and access
control cannot be achieved successfully for various network functionalities through …

Security and trust management in MANET

A Singh, M Maheshwari, Nikhil, N Kumar - International Conference on …, 2011 - Springer
A mobile adhoc network (MANET) is a network which does not have any centralized control.
Security and trust management are paramount concern for these networks for efficient data …

A preference-based protocol for trust and head selection for cluster-based MANET

R Mylsamy, S Sankaranarayanan - Wireless Personal Communications, 2016 - Springer
Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for
trust and head selection (2PTH) algorithm is proposed for communication privacy from …

Intrusion detection in manet using fuzzy logic

M Wahengbam, N Marchang - 2012 3rd National Conference …, 2012 - ieeexplore.ieee.org
Mobile Ad hoc network (MANET) is a new paradigm in wireless revolution, which is a self-
configured network of wireless mobile nodes. Due to proliferation of miniature yet powerful …

Agent-based trusted on-demand routing protocol for mobile ad-hoc networks

IT Abdel-Halim, HMA Fahmy, AM Bahaa-Eldin - Wireless Networks, 2015 - Springer
The routing performance in mobile ad hoc networks (MANETs) relies on the co-operation of
the individual nodes that constitute the network. The existence of misbehaving nodes may …

[PDF][PDF] Malicious node detection system for mobile ad hoc networks

A Rajaram, DS Palaniswami - International Journal of Computer Science …, 2010 - Citeseer
In this paper, we develop a trust based security protocol based on a MAC-layer approach
which attains confidentiality and authentication of packets in both routing and link layers of …