[PDF][PDF] Mobile Ad Hoc Network in Disaster Area Network Scenario: A Review on Routing Protocols.

ZA Younis, AM Abdulazeez… - … Journal of Online & …, 2021 - researchgate.net
Disasters could cause communication systems to partially or completely down. In such a
case, relief operations need a rapidly deployed communication system to save lives …

Detecting and Isolating Black‐Hole Attacks in MANET Using Timer Based Baited Technique

A Yasin, M Abu Zant - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Mobile Ad hoc Network (MANET) is a type of wireless networks that provides numerous
applications in different areas. Security of MANET had become one of the hottest topics in …

Performance enhancement of optimized link state routing protocol by parameter configuration for UANET

EA Tuli, M Golam, DS Kim, JM Lee - Drones, 2022 - mdpi.com
The growing need for wireless communication has resulted in the widespread usage of
unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol …

Black hole attack detection using fuzzy based intrusion detection systems in MANET

H Moudni, M Er-rouidi, H Mouncif… - Procedia Computer …, 2019 - Elsevier
Abstract Mobile Ad hoc NETworks (MANETs) are a new type of wireless communications
that are operating in a highly dynamic and unpredictable environment. These networks are …

Performances of single and double basin solar-stills

AA Al-Karaghouli, WE Alnaser - Applied Energy, 2004 - Elsevier
Two solar stills (single basin and double decker) were fabricated and tested. Both have the
same basin area. The inner dimensions of each was 90× 50 cm (effective area 0.45 m2). For …

A deep learning methods for intrusion detection systems based machine learning in MANET

S Laqtib, KE Yassini, ML Hasnaoui - Proceedings of the 4th international …, 2019 - dl.acm.org
Deep learning is a subset of machine learning where algorithms are created and function
similar to those in machine learning, but there are numerous layers of these algorithms each …

Black‐hole attack and counter measure in ad hoc networks using traditional routing optimization

JR Pullagura, VR Dhulipalla - Concurrency and Computation …, 2023 - Wiley Online Library
Ad hoc networks have constraints like energy, memory, computation power, and
communication range which makes the nodes vulnerable for attacks. In this article, black …

An efficient security framework for trusted and secure routing in MANET: A comprehensive solution

G Vidhya Lakshmi, P Vaishnavi - Wireless Personal Communications, 2022 - Springer
Secure routing of data in MANET (Mobile Ad-hoc Network) is an important concern to save
the network from various attacks such as blackhole attack, wormhole attack, and gray-hole …

A study on improving secure routing performance using trust model in MANET

H Yang - Mobile Information Systems, 2020 - Wiley Online Library
MANET is utilized in many fields because of its advantage in quickly establishing networks.
The network will perform well if mobile nodes trust each other and act cooperatively …

[PDF][PDF] Mobile ad hoc network routing protocols using opnet simulator

MS Avhankar, DJA Pawar, S Majalekar… - International Journal on …, 2022 - researchgate.net
Mobile Ad Hoc Networks have evolved rapidly and are finding numerous applications in the
areas of selfcreating, self-organizing and self-administering wireless networks. The present …