FH Tseng, HP Chiang… - Journal of …, 2018 - s3.ap-northeast-2.amazonaws.com
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had accomplished a survey of black hole attacks in MANETs. However network technology is …
K Guo, Y Lv - International Journal of Pattern Recognition and …, 2020 - World Scientific
In view of the two shortcomings of the AODV routing protocol, they do not consider the bandwidth, delay and cost in the actual network, and the routing table has only one path …
B Joshi, NK Singh - … Symposium on Colossal Data Analysis and …, 2016 - ieeexplore.ieee.org
Mobile ad hoc networks operate without any fixed infrastructure and centralized administration. It is an autonomous system of wirelessly connected mobile nodes having the …
TE Fogwell, EO Ochola - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Mobility and portability of wireless communication devices in Mobile Ad Hoc Networks have introduced data security threats. This is due to the utilization of multiple hops as a result of …
MM Mjahidi - International Journal of Computer Applications, 2015 - academia.edu
ABSTRACT Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing …
Y Ding, J Gao, X Wang - 2015 3rd International Conference on …, 2015 - atlantis-press.com
Abstract For complex Ad Hoc network environment, based on Elman neural network prediction model, using particle swarm optimization algorithm to optimize the original Elman …
RAR Mahmood, M Hussin, N Manshor… - 2014 International …, 2014 - ieeexplore.ieee.org
Efficient and quick attack detection is critical in any networks, especially if the attack is harmful and can bring down the whole network within a short period of time. A black hole or …
A Antonidoss, G Subathra - NeuroQuantology, 2022 - search.proquest.com
The routing of wireless sensor networks relies on a trusted routing scheme to ensure the efficiency and security of the transmission. Some of the techniques such as trust …