A survey on trust models in heterogeneous networks

J Wang, Z Yan, H Wang, T Li… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Heterogeneous networks (HetNets) merge different types of networks into an integrated
network system, which has become a hot research area in recent years towards next …

BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map

AM El-Semary, H Diab - IEEE Access, 2019 - ieeexplore.ieee.org
Even though the ad-hoc on-demand distance vector (AODV) is a broadly used routing
protocol for mobile ad-hoc networks (MANETs), it is vulnerable to a blackhole attack. Lu et …

Comprehensive Analysis of IoT Malware Evasion Techniques

A Al-Marghilani - Engineering, Technology & Applied Science Research, 2021 - etasr.com
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices
lack certain characteristics such as homogeneity and security. Malware is malicious software …

Watchdog malicious node detection and isolation using deep learning for secured communication in MANET

AS Narmadha, S Maheswari, SN Deepa - Automatika: časopis za …, 2023 - hrcak.srce.hr
Sažetak Mobile Ad-hoc Networks (MANETs) are wireless networks formed dynamically by
connecting or leaving nodes to and from the network without any fixed infrastructure. These …

A study review on gray and black hole in mobile Ad Hoc networks (MANETs)

MM Hamdi, AF Flaih, ML Jameel… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Unlike other types of networks, a MANET is self-configuring and does not need centralized
management. Anywhere and at any moment, a MANET may be established. Mobile ad hoc …

[HTML][HTML] 3R: A reliable multi agent reinforcement learning based routing protocol for wireless medical sensor networks

MS Hajar, HK Kalutarage, MO Al-Kadri - Computer Networks, 2023 - Elsevier
Abstract Interest in the Wireless Medical Sensor Network (WMSN) is rapidly gaining
attention thanks to recent advances in semiconductors and wireless communication …

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks

N Wang, S Zhang, Z Zhang, J Qiao, J Fu… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
With the continuous development of sensor technology, more and more users hope to
monitor and collect information in a certain area safely and efficiently by deploying …

Current vulnerabilities, challenges and attacks on routing protocols for mobile ad hoc network: a review

M AlRubaiei, H sh Jassim, BT Sharef, S Safdar… - Swarm Intelligence for …, 2020 - Elsevier
A mobile ad hoc network (MANET) is composed of a set of free and mobile nodes connected
on an ad hoc basis. They form a temporary dynamic wireless network without any …

[HTML][HTML] Sinkhole attack defense strategy integrating SPA and jaya algorithms in wireless sensor networks

Z Teng, M Li, L Yu, J Gu, M Li - Sensors, 2023 - mdpi.com
A sinkhole attack is characterized by low difficulty to launch, high destructive power, and
difficulty to detect and defend. It is a common attack mode for wireless sensor networks. This …

[PDF][PDF] Dual Security Based Protocol Against Gray-Hole Attack in MANET.

V MANKOTIA, RK Sunkaria… - Adhoc & Sensor Wireless …, 2023 - researchgate.net
Mobile Ad-hoc network is characterized as a network of the self-configuring type that
comprises several mobile nodes and can be set up easily without needing any kind of …