P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less working and vulnerability of underlined standard routing protocols is exposed to various …
Ad hoc networks are a new perspective of wireless communication for versatile hosts. Security is a colossal worry for ad hoc networks, especially for those security-touchy …
P Rani, Kavita, S Verma, DB Rawat, S Dash - Neural Computing and …, 2022 - Springer
Abstract In Mobile Ad hoc Network (MANET), network topology changes as devices/users/nodes move and nodes can serve as a source, destination, or router for the …
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …
M Prasad, S Tripathi, K Dahal - Engineering Applications of Artificial …, 2023 - Elsevier
Abstract A Mobile Ad-Hoc Network (MANET) is a widely used temporary network. It is simple to install and handle. However, its dynamic nature is more vulnerable to routing attacks than …
Vehicular Ad-Hoc Networks (VANETs) deliver a wide range of commercial as well as safety applications and further motivate the advancements of Internet of Vehicles (IoV), Intelligent …
F Aliyu, T Sheltami, EM Shakshuki - Procedia computer science, 2018 - Elsevier
Due to the large number of IoT devices available, data needed to be processed by cloud service providers has grown exponentially. This leads to increase in the latency of cloud …
N Schweitzer, A Stulman, RD Margalit… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.), detection & mitigation techniques only function after the attack has commenced. Prevention …