A deep-learning-based secure routing protocol to avoid blackhole attacks in VANETs

A Amalia, Y Pramitarini, RHY Perdana, K Shim, B An - Sensors, 2023 - mdpi.com
Vehicle ad hoc networks (VANETs) are a vital part of intelligent transportation systems (ITS),
offering a variety of advantages from reduced traffic to increased road safety. Despite their …

Black hole attack detection using Dolphin Echo-location-based machine learning model in MANET environment

R Vatambeti, SV Mantena, KVD Kiran… - Computers and …, 2024 - Elsevier
Mobile ad hoc networks have surged in popularity in recent years and are now widely
regarded as critically important due to their low complexity and quick expansion. However, a …

Safeguarding the Internet of Things: Elevating IoT routing security through trust management excellence

AW Burange, VM Deshmukh, YA Thakare… - Computer Standards & …, 2025 - Elsevier
This study presents an innovative IoT routing security model that integrates trust
management to bolster network reliability, improve resilience against routing attacks, and …

Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks

MS Gowtham, M Ramkumar, SS Jamaesha… - Computers & …, 2024 - Elsevier
Abstract In a Mobile Ad hoc Network (MANET), the network structure constantly evolves due
to the movement of devices, users, or nodes. The Black Hole Attack (BHA) is recognized as …

[PDF][PDF] Attack Detection using DL based Feature Selection with Improved Convolutional Neural Network

VG Krishnan, S Hemamalini, P Cheraku, KH Priya… - IJEER, 2023 - ijeer.forexjournal.co.in
░ ABSTRACT-Decentralized wireless networks that may connect without a central hub are
named Mobile Ad-hoc Networks (MANET). Attacks and threats of the most common kind can …

[PDF][PDF] Secure and Reliable Routing in the Internet of Vehicles Network: AODV-RL with BHA Attack Defense.

N Ahmed, K Mohammadani, AK Bashir… - … in Engineering & …, 2024 - cdn.techscience.cn
Wireless technology is transforming the future of transportation through the development of
the Internet of Vehicles (IoV). However, intricate security challenges are intertwined with …

[PDF][PDF] Исследование влияния атак на структурные и параметрические метрики сетей с адаптивной топологией

ЕЮ Павленко - Вопросы кибербезопасности, 2023 - cyberrus.info
Методы исследований: системный анализ существующих структурных метрик для
оценки состояния компьютерных сетей, теоретическая формализация, проведение …

Simulative Analysis of Column Mobility Model for Proactive and Reactive Routing Protocols in Highly Dense MANET

S Kour, H Sarangal, M Singh… - Recent Advances in …, 2024 - ingentaconnect.com
One of the most promising fields of research in recent years is Mobile Ad Hoc Networks
(MANET). The well-known advantages of the internet for specific types of applications lead …

Effect of Variation in Pause Times Over MANET Routing Protocols

S Kour, M Singh, B Singh, H Sarangal - International Conference on …, 2023 - Springer
Abstract The Mobile Ad-hoc Networks (MANETs) are self-organizing and self-configuring
networks that are formed dynamically without any existing infrastructure. These networks …

Two-Pronged Intrusion Detection System for MANET

N Rajan, MV Kiran, K Vigneshwari… - … in Computer Science …, 2024 - ieeexplore.ieee.org
Mobile Ad hoc Networks (MANETs) provide a flexible wireless infrastructure for various
applications. Still, their decentralized and dynamic nature makes them susceptible to …