Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs

RH Jhaveri, SJ Patel, DC Jinwala - INFOCOMP Journal of …, 2012 - infocomp.dcc.ufla.br
Abstract Design of basic routing protocols along with inherent characteristics of Mobile Ad-
hoc Networks (MANETs) makes them vulnerable to various types of Do Sattack sat the …

Prevention of black hole attack on AODV in MANET using hash function

AA Aware, K Bhandari - Proceedings of 3rd International …, 2014 - ieeexplore.ieee.org
Mobile ad hoc networks (MANET) are acquiring popularity today, as it offers wireless
connectivity to the users irrespective of their geographical position. An ad-hoc network does …

[引用][C] Study of Black Hole Attack in AODV

SA Butt, T Jamal - Proc. of International Journal of Future Generation …, 2017

Black hole detection using evolutionary algorithm for IDS/IPS in MANETs

R Thanuja, A Umamakeswari - cluster computing, 2019 - Springer
Mobile ad hoc network (MANET) is a self organized structure of mobile nodes which are
distributed unevenly in the environment. There are various MANET routing protocols exist …

Literature review on network security in Wireless Mobile Ad-hoc Network for IoT applications: network attacks and detection mechanisms

S Pamarthi, R Narmadha - International Journal of Intelligent …, 2022 - emerald.com
Purpose Nowadays, more interest is found among the researchers in MANETs in practical
and theoretical areas and their performance under various environments. WSNs have …

Intelligent route discovery towards rushing attacks in ad hoc wireless networks

U Allimuthu, K Mahalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
MANET (mobile ad-hoc networks) are distributed or delegated away from a central server,
authoritative location of wireless networks that communicate without pre-existing structure …

An approach for optimal-secure multi-path routing and intrusion detection in MANET

N Veeraiah, BT Krishna - Evolutionary Intelligence, 2022 - Springer
Mobile ad-hoc network (MANET) is dynamic in nature that is susceptible to energy and
security constraints. Among most of the existing techniques, energy optimization was a …

An effective implementation of security based algorithmic approach in mobile adhoc networks

R Singh, P Singh, M Duhan - Human-Centric Computing and Information …, 2014 - Springer
Abstract Mobile Ad-hoc Network one of the prominent area for the researchers and
practitioners in assorted domains including security, routing, addressing and many others. A …

Security-aware routing on wireless communication for E-health records monitoring using machine learning

S Sengan, OI Khalaf, GRK Rao, DK Sharma… - International Journal of …, 2022 - igi-global.com
An ad hoc structure is self-organizing, self-forming, and system-free, with no nearby
associations. One of the significant limits we must focus on in frameworks is leading. As for …

Cluster based malicious node detection system for mobile ad-hoc network using ANFIS classifier

G Subburayalu, H Duraivelu… - Journal of Applied …, 2023 - Taylor & Francis
Improvement of efficient packet access in a wireless Mobile Ad-Hoc network (MANET) is vital
for achieving high speed data rate. The degradation occurs due to identification of malicious …