ITCA, an IDS and trust solution collaborated with ACK based approach to mitigate network layer attack on MANET routing

N Marathe, SK Shinde - Wireless Personal Communications, 2019 - Springer
The feature of Dynamic topology configuration of MANET reciprocates the security
constraints and bring in many security threats that hamper the routing and time bound …

Improved itca method to mitigate network-layer attack in manet

NR Marathe, SK Shinde - … and Networks: Proceedings of GUCON 2019, 2020 - Springer
MANET is well known for its inherent feature of on-demand ad hoc establishment of network.
This makes MANET a suitable option for many applications like Disaster management …

An efficient security framework for trusted and secure routing in MANET: A comprehensive solution

G Vidhya Lakshmi, P Vaishnavi - Wireless Personal Communications, 2022 - Springer
Secure routing of data in MANET (Mobile Ad-hoc Network) is an important concern to save
the network from various attacks such as blackhole attack, wormhole attack, and gray-hole …

A Review: An Efficient and Reliable Secure Routing Mechanism with the Prevention of Attacks in Mobile Ad-Hoc Network (MANET)

KS Prasanna, B Ramesh - Wireless Personal Communications, 2023 - Springer
In wireless communication systems, Wireless ad hoc network plays a significant role in the
research domain. MANET is also an ad hoc network that build a temporary network to …

Improving routing disruption attack detection in MANETs using efficient trust establishment

KAP Yamini, J Stephy, K Suthendran… - Transactions on …, 2022 - Wiley Online Library
Security is a fundamental prerequisite in self‐evolvability network and providing that in any
situation is the most problematic task as the network is highly dynamic with no trusted …

Multidimensional multi-attribute approach to counter the routing attacks on MANET

NR Marathe, SK Shinde - Wireless Personal Communications, 2021 - Springer
The Dynamic on demand network formation feature of MANET tend to have its biggest the
vulnerability that infect the process of route establishment using routing algorithms and …

Safe routing approach by identifying and subsequently eliminating the attacks in MANET

SM Sankar, D Dhinakaran, CC Deboral… - arXiv preprint arXiv …, 2023 - arxiv.org
Wireless networks that are decentralized and communicate without using existing
infrastructure are known as mobile ad-hoc networks. The most common sorts of threats and …

Malicious node prevention and mitigation in MANETs using a hybrid security model

A Naveena, KRL Reddy - Information Security Journal: A Global …, 2018 - Taylor & Francis
Mobile ad-hoc network (MANET) has got tremendous success and attention due to its self-
maintenance and self-configuration properties or behavior. Based on wired and wireless …

[PDF][PDF] A study of attacks, attack detection and prevention methods in proactive and reactive routing protocols

S Kannan, T Maragatham, S Karthik… - International Business …, 2011 - academia.edu
MANET has no clear line of defense so, it is accessible to both legitimate network users and
malicious attackers. In the presence of malicious nodes, one of the main challenges in …

Intelligent route discovery towards rushing attacks in ad hoc wireless networks

U Allimuthu, K Mahalakshmi - Journal of Ambient Intelligence and …, 2022 - Springer
MANET (mobile ad-hoc networks) are distributed or delegated away from a central server,
authoritative location of wireless networks that communicate without pre-existing structure …