Privacy-preserving schemes for ad hoc social networks: A survey

MA Ferrag, L Maglaras, A Ahmim - … Communications Surveys & …, 2017 - ieeexplore.ieee.org
We review the state of the art of privacypreserving schemes for ad hoc social networks
including mobile social networks (MSNs) and vehicular social networks (VSNs). Specifically …

A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges

M Bhattacharya, S Roy, S Chattopadhyay… - Security and …, 2023 - Wiley Online Library
Over the past few years, online social networks (OSNs) have become an inseparable part of
people's daily lives. Instead of being passive readers, people are now enjoying their role as …

EAACK—a secure intrusion-detection system for MANETs

EM Shakshuki, N Kang… - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
The migration to wireless network from wired network has been a global trend in the past
few decades. The mobility and scalability brought by wireless network made it possible in …

Security issues in flying ad-hoc networks (FANETS)

İ Bekmezci, E Şentürk, T Türker - Journal of Aeronautics and …, 2016 - jast.hho.msu.edu.tr
Abstract Technological advancements in Unmanned Aerial Vehicles (UAV) encourage the
use of multi-UAV systems in military and civil applications. The most important benefit of the …

Multitier energy system review on secure intrusion detection system in MANETs

PP Rajendra - 2017 2nd IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Wireless communication networks is the most found networks in the recent years for the
reason that it does not rely on any conventional infrastructure. Also, for all the users the …

TBMR: trust based multi-hop routing for secure communication in flying ad-hoc networks

R Kumar, B Sharma, S Athithan - Wireless Networks, 2023 - Springer
Flying ad-hoc networks are gaining popularity as a type of mobile ad-hoc network due to
their versatile applications across various industries, such as emergency management …

An efficient intrusion detection in resource-constrained mobile ad-hoc networks

M Bouhaddi, MS Radjef, K Adi - Computers & Security, 2018 - Elsevier
We propose an efficient intrusion detection scheme for Mobile Ad-hoc Networks (MANETs).
The scheme allows the reinforcing of network security while preserving the resources of the …

Honeypot TB-IDS: trace back model based intrusion detection system using knowledge based honeypot construction model

A Umamaheswari, B Kalaavathi - Cluster Computing, 2019 - Springer
In current years, the use of mobile ad hoc networks (MANETs) has been extensive in many
applications, counting some mission dangerous applications, and as such safety has …

Detection of black hole attacks in mobile ad hoc networks via hsa-cbds method

AM Fahad, AA Ahmed, AH Alghushami… - Intelligent Computing & …, 2019 - Springer
Security is a critical problem in implementing mobile ad hoc networks (MANETs) because of
their vulnerability to routing attacks. Although providing authentication to packets at each …

[PDF][PDF] An Enhanced Scheme to Pinpoint Malicious Behavior of Nodes In Manet's

N Malathi, M Sivaram - 2015 - academia.edu
Mobile Ad hoc Network (MANET) has been pervasive in many applications, including some
procedures such as security in critical applications has been a major threats in MANETs …