An Empirical Model for the Investigation of Effective Intrusion Detection Systems by Using K-Nearest Neighbor (KNN) and Fuzzy (Fuzzy KNN) Algorithms in Mobile Ad …

NC Kumar, A Srinivas, N Selvaganesh… - … Online Journal of …, 2021 - search.ebscohost.com
A mobile ad hoc network (MANET) is a high-speed network that does not have any
infrastructure or centralized management. In recent years, MANET has been popular and …

Identifying Intruders in MANET: Exploiting RREP Message of AODV Protocol

DK Verma, A Kush, R Jain - International Journal of Information …, 2020 - igi-global.com
Mobile ad hoc networks are characterized by wireless medium used for communication,
frequent change of topology, and non-availability of centralized control for authentication …

[PDF][PDF] Trust Management Based Improved Mechanism to Prevent MANET from Security Threats Using Optimized SVM

V Walia, R Malhotra - academia.edu
A temporal network creates various issues which are managed by nodes, communicating
with the base station. The flow of packets with different routes usually attacked by malicious …

[PDF][PDF] Prevention and Detection Techniques under Black Hole Attack in MANETS: A Survey

N Mittal, L Chand - Advances in Wireless and Mobile …, 2017 - academia.edu
Wireless mobile ad hoc network (MANET) is vulnerable to attacks due to lack of
infrastructures. With the attacks they made the information not useful for users. In MANETS …

Anthoc Based Trust Behavioural Network (Anthoc-tbn) Assist to Detect Blackhole Attack by Discover Secure Route

M Rajkumar, J Karthika - 2021 - researchsquare.com
MANET is a wireless topology mainly used to grouping several mobile nodes as network.
This wireless network is highly vulnerable by several security threads. Blackhole attack, a …

[PDF][PDF] Mobile Ad Hoc Networks: An Overview

G Sharma, S Dhiman - academia.edu
Mobile Ad-Hoc Network (MANET) is an infrastructure less wireless network of mobile nodes
(Smart phones, Laptops, iPads, PDAs etc.) that self-configure to reconstruct their topology …

Black-Hole and Wormhole Attack Using DYMO and AODV Protocol: A Review

N Chaurasia, P Dimri, KK Gupta - High Performance Vision Intelligence …, 2020 - Springer
From last two decades, mobile ad-hoc network has significantly contributed to the research.
Mobile ad-hoc network basically filed of wireless ad-hoc network in which all the connected …

[PDF][PDF] Host based Detection and Prevention of Black Hole attacks by AODV-ICCSO Algorithm for security in MANETs

K Kannan - pdfs.semanticscholar.org
Background: Mobile Ad-hoc Networks (ie) MANETs are gaining rapid fame in recent days
and are considered as very significant because of their easier implementation and growing …

[PDF][PDF] Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles

A ALDEGHEISHEM - researchgate.net
ABSTRACT Detection of Black Hole attacks is one of the most challenging and critical
routing security issues in vehicular ad hoc networks (VANETs) and autonomous and …

[PDF][PDF] EFFECTIVE INTRUSION DETECTION SYSTEM FOR AODV ROUTING PROTOCOL USING NETWORK SIMULATOR

SP Patel, B Mishra, M Lambert - academia.edu
Security is an important part for any communication structure. When protocol itself is prone to
infectious and nodes are moving, then it is necessary to safeguard the communication …