Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

Mitigation of black hole attacks using firefly and artificial neural network

P Rani, Kavita, S Verma, DB Rawat, S Dash - Neural Computing and …, 2022 - Springer
Abstract In Mobile Ad hoc Network (MANET), network topology changes as
devices/users/nodes move and nodes can serve as a source, destination, or router for the …

Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks

P Rani, Kavita, S Verma, N Kaur, M Wozniak, J Shafi… - Sensors, 2021 - mdpi.com
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET

M Shukla, BK Joshi, U Singh - Wireless Personal Communications, 2021 - Springer
Numerous network can be connected by using the mobile ad hoc network. It can have
security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole …

Strong and stable Data communication Using Artificial Intelligence method in Mobile Ad-Hoc Networks

G Ramkumar, G Anitha, RT Prabu… - … and Smart Electrical …, 2022 - ieeexplore.ieee.org
Using the idea of machine learning, the authors of this study provide a novel security
mechanism for an Internet of Things model that is built on a mobile ad hoc network …

A recurrent reward based learning technique for secure neighbor selection in mobile AD-HOC networks

KS Sankaran, N Vasudevan, KR Devabalaji… - IEEE …, 2021 - ieeexplore.ieee.org
Mobile ad-hoc network is an assortment of distinct attribute-based mobile devices that are
autonomous and are cooperative in establishing communication. These nodes exploit …

Cluster Head Selection and Energy Efficient Multicast Routing Protocol‐Based Optimal Route Selection for Mobile Ad Hoc Networks

R Suresh Kumar, P Manimegalai… - Wireless …, 2022 - Wiley Online Library
Wireless networks with a large number of peer nodes are known as mobile ad hoc networks
(MANETs). In MANETs, the mobility of nodes causes a number of challenges, including path …

Research of security routing protocol for UAV communication network based on AODV

X Tan, Z Zuo, S Su, X Guo, X Sun - Electronics, 2020 - mdpi.com
With the rapid development of information technology and the increasing application of UAV
in various fields, the security problems of unmanned aerial vehicle (UAV) communication …

Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs

G Arulselvan, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Maintaining a healthy environment requires constant vigilance. Keeping constant tabs on
environmental factors might be a useful tool in the fight against and recovery from …

A Survey of Software-Defined Smart Grid Networks: Security Threats and Defense Techniques

D Agnew, S Boamah, J McNair - arXiv preprint arXiv:2306.14697, 2023 - arxiv.org
Smart grids are replacing conventional power grids due to rising electricity use, failing
infrastructure, and reliability problems. Two-way communication, demand-side …