Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art

M Yaseen, K Saleem, MA Orgun, A Derhab… - Telematics and …, 2018 - Elsevier
Recent advances in hardware technology have led to the development of low cost, power
efficient and more feature rich devices that are amongst the most critical parts of …

Identity attack detection system for 802.11-based ad hoc networks

M Faisal, S Abbas, H Ur Rahman - EURASIP Journal on Wireless …, 2018 - Springer
Due to the lack of centralized identity management and the broadcast nature of wireless ad
hoc networks, identity attacks are always tempting. The attackers can create multiple …

A method of routing optimization using CHNN in MANET

H Yang, Z Li, Z Liu - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
The performance of routing protocols determines the performance of MANET, and the
development and improvement of routing protocols have been the hotspot of MANET …

Marc: A novel framework for detecting mitm attacks in ehealthcare ble systems

M Yaseen, W Iqbal, I Rashid, H Abbas… - Journal of medical …, 2019 - Springer
Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition
through resource constrained medical sensors, mostly configured with No-input No-output …

Security for cyber-physical systems in healthcare

K Saleem, Z Tan, W Buchanan - Health 4.0: How Virtualization and Big …, 2017 - Springer
The great leap forward of cyber-physical systems has made provision for future personalized
medicine. However, these systems are prone to cyber attacks. To provide patients with …

Current vulnerabilities, challenges and attacks on routing protocols for mobile ad hoc network: a review

M AlRubaiei, H sh Jassim, BT Sharef, S Safdar… - Swarm Intelligence for …, 2020 - Elsevier
A mobile ad hoc network (MANET) is composed of a set of free and mobile nodes connected
on an ad hoc basis. They form a temporary dynamic wireless network without any …

An anti-gray hole attack scheme in mobile ad hoc network

O Moradipour, M Fathi - International Journal of Wireless Information …, 2020 - Springer
Dynamic variation of network topology in mobile ad hoc networks (MANET) forces network
nodes to work together and rely on each other for routing. Considering the lack of a central …

SeCRoP: secure cluster head centered multi‐hop routing protocol for mobile ad hoc networks

MM Umar, A Mehmood, H Song - Security and Communication …, 2016 - Wiley Online Library
Because of the absence of central control and limited capabilities of tiny nodes in mobile ad
hoc networks (MANETs), these types of networks are always vulnerable to different kind of …

Performance Analysis of Efficiently trusted AODV serving Security in MANET under Blackhole Attack Using Genetic Algorithm

I Nausheen, A Upadhyay - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The mobile nodes or systems in mobile ad hoc networks wirelessly transmit binary data. The
topology of the network is dynamic. Therefore, because of the network's wireless nature …

Performance analysis of black hole attack in MANET

AT Kolade, MF Zuhairi, E Yafi, CL Zheng - Proceedings of the 11th …, 2017 - dl.acm.org
The underlying element that supports the device communication in the MANET is the
wireless connection capability. Each node has the ability to communicate with other nodes …