A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation

N Khanna, M Sachdeva - International Journal of …, 2019 - Wiley Online Library
Security against routing attacks in MANET is most critical issue and traditional concepts of
cryptography, authentication, or Watchdog are not that significant in mitigation of these …

Cluster‐based emergency message dissemination strategy for VANET using V2V communication

S Benkerdagh, C Duvallet - International Journal of …, 2019 - Wiley Online Library
Data dissemination in vehicular ad hoc network (VANET) is emerging as a critical area of
research. One of the challenges posed by this domain is the reliability of connection, which …

A secure core-assisted multicast routing protocol in mobile ad-hoc network

F Khan, AW Khan, S Khan, I Qasim… - Journal of Internet …, 2020 - jit.ndhu.edu.tw
In this paper, an Efficient and Reliable Core-Assisted Multicast Routing Protocol (ERASCA)
is secured from a malicious/selfish receiver attack and fabrication attack. In former the …

An efficient packet dropping attack detection mechanism in wireless ad-hoc networks using ECC based AODV-ACO protocol

S Kanthimathi, P Jhansi Rani - Wireless Networks, 2022 - Springer
The nodes in a Wireless Ad hoc Network (WANET) intercommunicate via wireless links
directly or by depending completely on other nodes as routers. Malicious packet dropping …

India: Intruder node detection and isolation action in mobile ad hoc networks using feature optimization and classification approach

T Kavitha, K Geetha, R Muthaiah - Journal of medical systems, 2019 - Springer
Due to lack of a central bureaucrat in mobile ad hoc networks, the security of the network
becomes serious issue. During malicious attacks, according to the motivation of intruder the …

Research on DSDV routing protocol based on wireless Mesh network

Y Fengjie, Y Hui, Z Ying - 2018 Chinese Control And Decision …, 2018 - ieeexplore.ieee.org
Based on the characteristics of weak mobility in wireless Mesh network, this paper
researched the Destination Sequenced Distance Vector (DSDV) routing and proposed …

IBFWA: Integrated Bloom Filter in Watchdog Algorithm for hybrid black hole attack detection in MANET

VK Kollati, SK - Information Security Journal: A Global Perspective, 2017 - Taylor & Francis
In recent days, the Mobile Ad-hoc Network (MANET) has gained more attention and
popularity due to its dynamic nature. However, it is highly vulnerable to attacks due to its …

A survey on detection of malicious nodes in wireless sensor networks

M Sahu, N Sethi, SK Das - 2022 6th International Conference …, 2022 - ieeexplore.ieee.org
Wireless Sensor Networks (WSN) are often utilized in different places where human access
is limited to monitor physical and environmental factors. They are vulnerable to errors and …

Security‐Based Mechanism for Proactive Routing Schema Using Game Theory Model

H Amraoui, A Habbani, A Hajami… - Mobile Information …, 2016 - Wiley Online Library
Game theory may offer a useful mechanism to address many problems in mobile ad hoc
networks (MANETs). One of the key concepts in the research field of such networks with …