A review of artificial intelligence based intrusion detection for software-defined wireless sensor networks

SMW Umba, AM Abu-Mahfouz… - 2019 IEEE 28th …, 2019 - ieeexplore.ieee.org
Wireless communications and Wireless Sensor Networks (WSNs) are intensively used in
manufacturing industries, in medical devices, for the determination of the position and for the …

Analysis on essential challenges and attacks on MANET security appraisal

N Sivapriya, R Mohandas - Journal of Algebraic Statistics, 2022 - publishoa.com
One of the most important next-generation wireless network technologies is Mobile Ad Hoc
Networks (MANETs). All of the mobile nodes in the MANET are self-configurable routers that …

Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad-hoc networks

YH Robinson, RS Krishnan, EG Julie, R Kumar… - Ad Hoc Networks, 2019 - Elsevier
Abstract Mobile Ad-hoc Networks are constructed without any administration, providing the
quality of service in spite of routing overhead. In MANET, it is impossible for a mobile host to …

TCP/IP layerwise taxonomy of attacks and defence mechanisms in mobile Ad Hoc networks

AA Mahamune, MM Chandane - Journal of The Institution of Engineers …, 2022 - Springer
Abstract Mobile Ad hoc NETwork (MANET) is a distributed architecture-less network having
mobile nodes dynamically building up routes among themselves for transmission of packets …

Link-disjoint multipath routing for network traffic overload handling in mobile ad-hoc networks

YH Robinson, EG Julie, K Saravanan, R Kumar… - IEEE …, 2019 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANETs) is the network of wireless mobile nodes with self-
organizing, dynamic network connectivity without any pre-defined infrastructure for wireless …

Predicting the position of adjacent nodes with QoS in mobile ad hoc networks

CC Vignesh, S Karthik - Multimedia Tools and Applications, 2020 - Springer
Abstract The Mobile Ad Hoc Networks are a self-regulatory set of autonomous nodes which
perform communication to all the other nodes within their communication ranges. The nodes …

A detailed survey on selfish node detection techniques for mobile ad hoc networks

S Kumar, K Dutta, G Sharma - 2016 Fourth International …, 2016 - ieeexplore.ieee.org
Due to the limited transmission capability of mobile nodes in mobile ad hoc networks
(MANETs), the intermediate nodes are used in multi-hop fashion for forwarding the packets …

Optimizing Security Measures in Decentralized Mobile Networks with Neutrosophic Fuzzy Topology and PKI

AA Salama, MY Shams, R Bhatnagar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
This study proposes a method to improve the security of decentralized mobile networks
using Neutrosophic Fuzzy Local Function Algorithms D*, B*, and A* to optimize the decision …

FJADA: Friendship based jellyfish attack detection algorithm for mobile ad hoc networks

S Kumar, K Dutta, A Garg - Wireless Personal Communications, 2018 - Springer
TCP and UDP are considered the most popular and well known transport layer protocols to
facilitate the end to end communication between two nodes in the network. TCP is used as …

[PDF][PDF] Detecting and avoiding selfish nodes in delay tolerant networks (DTNs)

S Kumar - International Journal of Recent Research Aspects, 2018 - ijrra.net
Sparse Mobile Ad hoc Networks are a class of Mobile Ad Hoc Networks (MANETs) in which
the population of nodes is sparse, and the interactions between the nodes in the network are …