Security of emergent automotive systems: A tutorial introduction and perspectives on practice

A Lopez, AV Malawade, MA Al Faruque… - IEEE Design & …, 2019 - ieeexplore.ieee.org
Security of Emergent Automotive Systems: A Tutorial Introduction and Perspectives on Practice
Page 1 10 2168-2356/19©2019 IEEE Copublished by the IEEE CEDA, IEEE CASS, IEEE SSCS …

A comparison of link layer attacks on wireless sensor networks

S Mohammadi, H Jadidoleslamy - arXiv preprint arXiv:1103.5589, 2011 - arxiv.org
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique
challenges. They usually consist of hundreds or thousands small sensor nodes such as …

STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET

MBM Kamel, I Alameri… - 2017 IEEE 2nd Advanced …, 2017 - ieeexplore.ieee.org
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes
connecting directly without a top-down network architecture or central controller. Absence of …

Mitigate black hole attack using hybrid bee optimized weighted trust with 2-Opt AODV in MANET

V Keerthika, N Malarvizhi - Wireless Personal Communications, 2019 - Springer
Abstract A Mobile Ad hoc Network (MANET) is susceptible to several security threats. This
work aims at securing a MANET against black hole attacks. Based on MANET …

Fibonacci sequence based multipath load balancing approach for mobile ad hoc networks

Y Tashtoush, O Darwish, M Hayajneh - Ad Hoc Networks, 2014 - Elsevier
Abstract This paper explores Fibonacci Multipath Load Balancing protocol (FMLB) for Mobile
Ad Hoc Networks (MANETs). The FMLB protocol distributes transmitted packets over …

Prevention of Blackhole Attack in MANET using certificateless signature scheme

V Kumar, M Shankar, AM Tripathi, V Yadav… - Journal of Scientific & …, 2022 - op.niscpr.res.in
Mobile AdHoc Networks (MANETs) are the network of self-configuring nodes. Such nodes
communicate through single as well as multi-hop modes without the aid of any centralized …

[PDF][PDF] A comparison of routing attacks on wireless sensor networks

S Mohammadi, RE Atani, H Jadidoleslamy - organization, 2011 - researchgate.net
Wireless sensor networks (WSNs) have many potential applications [1, 5] and unique
challenges. They usually consist of hundreds or thousands small sensor nodes such as …

Security issues in mobile adhoc network: A survey paper

A Vij, V Sharma - 2016 International Conference on Computing …, 2016 - ieeexplore.ieee.org
MANET finds many advantages over the wired networks, however it still has some security
problems which affects network in many ways. Till now a lot of work has been performed in …

[PDF][PDF] Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network

R Sharma, R Shrivastava - International Journal of Computer …, 2014 - academia.edu
A Wireless ad-hoc network is a temporary network set up by wireless mobile computers (or
nodes) moving arbitrary in the places that have no network infrastructure. Since the nodes …

[PDF][PDF] Secure data transfer in manet with key calculator and key distributer using cryptography methods

YK Alapati, S Ravichandran - International Journal of Safety and …, 2020 - academia.edu
Accepted: 10 June 2020 A Mobile Ad Hoc Network (MANET) is combined with number of
versatile nodes that can communicate with one another without having any predefined …