Prevention of Denial of Service (DoS) attack in OLSR protocol using fictitious nodes and ECC algorithm

R Bhuvaneswari… - … Conference on Algorithms …, 2017 - ieeexplore.ieee.org
Security is the most important issue which needs to be given utmost importance and as
bothMobile Ad hoc Networks (MANET) and Wireless Sensor Networks (WSN) have similar …

Trust aware cooperative optimised link state routing protocol

RV Potukuchi, K Kant - International Journal of Systems …, 2017 - inderscienceonline.com
Optimised link state routing (OLSR) protocol is a popular proactive routing protocol for
wireless ad-hoc networks (WANETs). The functionality of OLSR protocol such as selection of …

Strategic modeling of secure routing decision in OLSR protocol in mobile ad-hoc network

CK Vanamala, G Raghvendra Rao - … of the 6th Computer Science On-line …, 2017 - Springer
Abstract Optimized Link State Routing (OLSR) is known for its potential features for
leveraging the communication requirement in mobile ad-hoc network. However, there is less …

A Study on Preventing Node Isolation Attack in OLSR Protocol

JL James, B Thomas - Procedia Technology, 2016 - Elsevier
A mobile ad hoc network (MANET) is a wireless communication system of continuously self-
configuring and infrastructure-less network of mobile devices which can move …

基于QoS 策略库的OLSR 路由改进方案

康冬华, 马林 - 电子测量技术, 2014 - cqvip.com
提出了OLSR 的QoS 策略库改进方案. 无线自组网对业务质量有着越来越高的需求, 针对OLSR
协议存在的单条链路理想化问题, 节点干扰理想化问题以及链路权值理想化问题 …

Secure communication using -non-dominated sorting genetic algorithm

J Kaur, S Kaur - Sādhanā, 2021 - Springer
With the growth in ad hoc devices, mobile ad hoc networks (MANETs) are extensively
employed to realize different kinds of real-time applications. However, ad hoc devices suffer …

Work in Progress: Securing Mesh Routing in a Critical Environment

YL Huang, CY Hung, TP Yen - 2023 International Conference …, 2023 - ieeexplore.ieee.org
In battlefield scenarios where the lack of internet infrastructure is prevalent, using Mobile Ad-
Hoc Networks (MANETs) becomes imperative to handle packets in a rapidly-changing …

Comparative Analysis of E-OLSR Algorithm in the presence of routing attacks in MANET

R Bhuvaneswari… - International Journal of …, 2018 - ingentaconnect.com
Background and Objective: Mobile ad hoc network (MANET) is an emerging and developing
area of wireless networks. These networks are formed by nodes that are within the …

JIR2TA: Joint Invocation of Resource-Based Thresholding and Trust-Oriented Authentication in Mobile Adhoc Network

BUI Khan, NF Zulkurnain, RF Olanrewaju… - Proceedings of SAI …, 2018 - Springer
The demands of a higher degree of security level for the mobile ad-hoc network are yet to
meet the best solution. Owing to the dynamic topology and decentralization issue, the …

Effectiveness of DCFM on different mobility models

N Schweitzer, A Stulman - 2020 8th International Conference …, 2020 - ieeexplore.ieee.org
Simulation based network protocol testing requires that one model reality correctly. Mis-
modelling can render results invalid. Hence, one must determine the context in which a …