Blockchain-assisted secure routing protocol for cluster-based mobile-ad hoc networks

N Ilakkiya, A Rajaram - International Journal of Computers …, 2023 - univagora.ro
MANETs aredecentralized network that involves mobile nodes. As the overall network is
mobile and has no centralization, network management, routing, and security become very …

Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs

VR Sugumaran, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
This paper focuses on achieving high-level security in Mobile Adhoc Networks (MANET) by
incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing …

[HTML][HTML] A trusted security approach to detect and isolate routing attacks in mobile ad hoc networks

GV Lakshmi, P Vaishnavi - Journal of Engineering Research, 2023 - Elsevier
Background Secure routing is of utmost importance in protecting mobile devices from
external threats. However, the dynamic characteristics of Mobile Ad hoc Networks (MANETs) …

Hybrid trust-based secure routing protocol for detection of routing attacks in environment monitoring over MANETs

G Arulselvan, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Maintaining a healthy environment requires constant vigilance. Keeping constant tabs on
environmental factors might be a useful tool in the fight against and recovery from …

A secured trusted routing using the structure of a novel directed acyclic graph-blockchain in mobile ad hoc network internet of things environment

N Ilakkiya, A Rajaram - Multimedia Tools and Applications, 2024 - Springer
In the contemporary technology context, several physical things may be used to support
human activities. The Internet of Things is a cutting-edge technology solution that is used to …

Blockchain-enabled lightweight intrusion detection system for secure MANETs

N Ilakkiya, A Rajaram - Journal of Electrical Engineering & Technology, 2024 - Springer
In this study, we provide a novel method dubbed BL-IDS, which makes use of a
decentralized Blockchain network to power a minimal intrusion detection system (IDS) for …

[PDF][PDF] POINT COORDINATION MECHANISM BASED MOBILE AD HOC NETWORK INVESTIGATION AGAINST JAMMERS.

SW Nourildean, SI Jasim, MT Abdulhadi… - … -European Journal of …, 2022 - academia.edu
In this paper, a jamming attack (a kind of Denial-of-Service attack) was investigated, which
interfered with the normal operation of a Mobile Ad Hoc network, which is more vulnerable to …

Hybrid machine learning approach for trust evaluation to secure MANET from routing attacks

K Meenakshi, M Revathi, SS Harsha… - Journal of Intelligent …, 2024 - content.iospress.com
A new era in communication has been ushered in by MANET networks, in which users
(nodes) interact with one another through a self-configuring network of handheld devices …

Α Chaotic Map-based Approach to Reduce Black Hole Attacks and Authentication Computational Time in MANETs

ASQ Syed, C Atheeq, L Ali, MT Quasim - Engineering, Technology & …, 2024 - etasr.com
Abstract The need for Mobile Ad hoc Networks (MANETs) has expanded with the
development of mobile computing and wireless sensor network technologies. However, this …

Facial emotion recognition using geometrical features based deep learning techniques

JLM Iqbal, MS Kumar, G Mishra, GR Asha… - INTERNATIONAL …, 2023 - fsja.univagora.ro
In recent years, intelligent emotion recognition is active research in computer vision to
understand the dynamic communication between machines and humans. As a result …