Optimised reactive resource aware routing for wireless infrastructure-less networks

AAK Mohammad, AM Abdul - International Journal of …, 2023 - inderscienceonline.com
Wireless infrastructure-less networks comprise mobile devices disseminated in radio
communication areas without any central coordinator. The nodes communicate directly if …

[PDF][PDF] Intrusion detection system in MANETS: a survey

I Meenatchi, K Palanivel - International Journal of Recent …, 2014 - researchgate.net
A mobile ad hoc network is an infrastructure less network which is prone to various
malicious attacks when incorporated in applications. It is a dreadful task for attaining security …

[PDF][PDF] Proposed agent based black hole node detection algorithm for ad-hoc wireless network

N Thakur, D Bisen, N Gupta - International Journal on Computational …, 2015 - academia.edu
A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among
researchers. The reason behind the popularity of MANET is flexibility and independence of …

[HTML][HTML] Adaptive fuzzy logic inspired path longevity factor-based forecasting model reliable routing in MANETs

R Subha, H Anandakumar - Sensors International, 2022 - Elsevier
Fuzzy theory is the optimal method for predicting the state of an entity in dynamic situations.
The fuzzy theory incorporates different linguistic variables and membership functions for …

Security Breaches Of Mobile Ad-Hoc Networks (MANET)-A Review

K Joshi, K Kumar - Educational Administration: Theory and Practice, 2024 - kuey.net
Security is an essential part of any network, wired or wireless. Attackers can combine active
and passive methods to penetrate otherwise undetectable routing in message and data …

HMM-Based IDS for Attack Detection and Prevention in MANET

P Pathak, E Chauhan, S Rathi, S Kosti - Information and Communication …, 2018 - Springer
MANETs are wireless networks which communicate without BS and centralized control
nodes. Due to its mobile nature of nodes, topology of the network changes frequently. So it is …

Comprehensive Survey of IDS Techniques in Mobile Ad Hoc Network (MANET)

K Chawla, J Gill, M Singh - … for Intelligent Systems: Proceedings of ICSCIS …, 2021 - Springer
In the current scenario, N2N communication is becoming an indispensable part of the
computing environment. It is the core part to run both industries or in fact every sphere …

Administrator and Fidelity Based Secure Routing (AFSR) Protocol in MANET

R Singh, HN Saha, D Bhattacharyya… - Journal of computing …, 2016 - hrcak.srce.hr
Sažetak The proliferation of mobile computing and communication devices are driving a
revolutionary change in our information society. Among all the applications and services run …

Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system

D Kukreja, SK Dhurandher… - International Journal of …, 2019 - inderscienceonline.com
Mobile ad hoc networks (MANETs) are subject to broad variety of attacks. Black hole and
grey hole attacks are security threats that make MANETs weak by inducing packet …

Grey hole attack in mobile ad-hoc network mitigation and protection

VMM Kanaparthi, K Vempati - AIP Conference Proceedings, 2024 - pubs.aip.org
Mobile ad-hoc systems collect identification base stations using a cable design without
infrastructure. Ad hoc means a transitory network or a customized networking. Here, any …