Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey

Z Movahedi, Z Hosseini, F Bayan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Trust management is a promising approach to conduct nodes' transactions and establish
management interactions in distributed mobile ad hoc networks (MANETs) in which nodes' …

Attacks and defenses in short-range wireless technologies for IoT

K Lounis, M Zulkernine - IEEE Access, 2020 - ieeexplore.ieee.org
The Internet of Things, abbreviated as IoT, is a new networking paradigm composed of
wireless and wired networks, geographically distributed and interconnected by a “secured” …

Malicious AODV: implementation and analysis of routing attacks in MANETs

H Ehsan, FA Khan - … Conference on Trust, Security and Privacy …, 2012 - ieeexplore.ieee.org
From the security perspective Mobile Ad hoc Networks (MANETs) are amongst the most
challenging research areas and one of the key reasons for this is the ambiguous nature of …

Security threats in MANETS: a review

S Jain - arXiv preprint arXiv:1405.5320, 2014 - arxiv.org
Ad hoc networks are the special networks formed for specific applications. Operating in ad-
hoc mode allows all wireless devices within range of each other to discover and …

An empirical study of routing attacks in mobile ad-hoc networks

S Aluvala, KR Sekhar, D Vodnala - Procedia Computer Science, 2016 - Elsevier
Mobile ad-hoc network is an infrastructure-less and self-organizing network, where nodes
communicate through wireless links. Because of its dynamic topology, security becomes a …

Novel approach for security in wireless sensor network using bio-inspirations

H Rathore, V Badarla, S Jha… - 2014 Sixth International …, 2014 - ieeexplore.ieee.org
Exploring the symbiotic nature of biological systems can result in valuable knowledge for
computer networks. Biologically inspired approaches to security in networks are interesting …

An efficient wormhole attack detection method in wireless sensor networks

G Wu, X Chen, L Yao, Y Lee, K Yim - Computer Science and …, 2014 - doiserbia.nb.rs
Wireless sensor networks are now widely used in many areas, such as military,
environmental, health and commercial applications. In these environments, security issues …

On the effect of black-hole attack on opportunistic routing protocols

M Salehi, A Darehshoorzadeh… - Proceedings of the 12th …, 2015 - dl.acm.org
Black-hole is a well-known routing attack through which malicious nodes try to downgrade
the communication performance of wireless networks. On the other hand, opportunistic …

Asymmetric and dynamic encryption for routing security in MANETs

A Echchaachoui, A Choukri, A Habbani… - … and Systems (ICMCS …, 2014 - ieeexplore.ieee.org
In mobile ad-hoc networks (MANETs), data transmission is usually performed between
mobile entities in an environment without infrastructure. So, data security is a key issue in …

EPSA: An efficient and privacy-preserving scheme against wormhole attack on reactive routing for mobile ad hoc social networks

MA Ferrag, M Nafa, S Ghanemi - International Journal of …, 2016 - inderscienceonline.com
In this paper, we propose an efficient and privacy-preserving scheme against (EPSA)
wormhole attack on reactive routing, called EPSA, for mobile ad hoc social networks. We …