A blockchain‐based contractual routing protocol for the internet of things using smart contracts

G Ramezan, C Leung - Wireless Communications and Mobile …, 2018 - Wiley Online Library
In this paper, we propose a novel blockchain‐based contractual routing (BCR) protocol for a
network of untrusted IoT devices. In contrast to conventional secure routing protocols in …

[PDF][PDF] Black Hole along with Other Attacks in MANETs: A Survey.

FH Tseng, HP Chiang… - Journal of …, 2018 - s3.ap-northeast-2.amazonaws.com
Security issue in mobile ad hoc network (MANET) is a promising research. In 2011, we had
accomplished a survey of black hole attacks in MANETs. However network technology is …

Optimizing routing path selection method particle swarm optimization

K Guo, Y Lv - International Journal of Pattern Recognition and …, 2020 - World Scientific
In view of the two shortcomings of the AODV routing protocol, they do not consider the
bandwidth, delay and cost in the actual network, and the routing table has only one path …

Mitigating dynamic dos attacks in mobile ad hoc network

B Joshi, NK Singh - … Symposium on Colossal Data Analysis and …, 2016 - ieeexplore.ieee.org
Mobile ad hoc networks operate without any fixed infrastructure and centralized
administration. It is an autonomous system of wirelessly connected mobile nodes having the …

Location based analysis of AODV performance in the presence of black hole nodes

TE Fogwell, EO Ochola - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Mobility and portability of wireless communication devices in Mobile Ad Hoc Networks have
introduced data security threats. This is due to the utilization of multiple hops as a result of …

[PDF][PDF] A survey on security solutions of AODV routing protocol against black hole attack in MANET

MM Mjahidi - International Journal of Computer Applications, 2015 - academia.edu
ABSTRACT Ad Hoc On-Demand Distance Vector (AODV) routing protocol is among the
efficient routing protocols in Mobile Ad Hoc Network (MANET). Because of its routing …

编队通信安全中的黑洞问题

李旭, 鲍京京, 刘颖 - 北京邮电大学学报, 2016 - journal.bupt.edu.cn
基于按需距离矢量路由协议, 结合编队通信系统的特点, 对黑洞问题进行了分析,
进而提出按需距离矢量路由的安全机制方案. 结合具体的路由协议, 不仅着眼于算法的特点 …

Ad Hoc network traffic prediction based on the Elman neural network

Y Ding, J Gao, X Wang - 2015 3rd International Conference on …, 2015 - atlantis-press.com
Abstract For complex Ad Hoc network environment, based on Elman neural network
prediction model, using particle swarm optimization algorithm to optimize the original Elman …

Performance evaluation of time-based black hole attack detection in mobile ad hoc networks

RAR Mahmood, M Hussin, N Manshor… - 2014 International …, 2014 - ieeexplore.ieee.org
Efficient and quick attack detection is critical in any networks, especially if the attack is
harmful and can bring down the whole network within a short period of time. A black hole or …

TrustedRouting for Intrusion Detection system in the blockchain Network

A Antonidoss, G Subathra - NeuroQuantology, 2022 - search.proquest.com
The routing of wireless sensor networks relies on a trusted routing scheme to ensure the
efficiency and security of the transmission. Some of the techniques such as trust …