SGHRP: Secure Greedy Highway Routing Protocol with authentication and increased privacy in vehicular ad hoc networks

E Khezri, E Zeinali, H Sargolzaey - Plos one, 2023 - journals.plos.org
VANETs are networks of connected intelligent vehicles that can communicate with each
other, as well as with infrastructure and fixed roadside equipment. As a result of the lack of …

A survey on parameters affecting Manet Performance

AM Eltahlawy, HK Aslan, EG Abdallah, MS Elsayed… - Electronics, 2023 - mdpi.com
A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can
share information through wireless links without dedicated hardware that handles the …

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

A cryptographic paradigm to detect and mitigate blackhole attack in VANET environments

RK Dhanaraj, SKH Islam, V Rajasekar - Wireless Networks, 2022 - Springer
Future communication systems have become the most commonly categorized as Mobile Ad
hoc Networks and Vehicular Ad hoc Network (VANET). A VANET aims to protect vehicle …

A hybrid wormhole attack detection in mobile ad-hoc network (MANET)

M Tahboush, M Agoyi - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANET) are decentralized wireless networks that communicate
without pre-existing infrastructure. MANETs are vulnerable to the most popular types of …

Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks

P Rani, Kavita, S Verma, N Kaur, M Wozniak, J Shafi… - Sensors, 2021 - mdpi.com
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

MAC-AODV based mutual authentication scheme for constraint oriented networks

M Adil, R Khan, MA Almaiah, M Al-Zahrani… - Ieee …, 2020 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) is an infrastructure free organization of various
operational devices. Due to their overwhelming characteristics, these networks are used in …

A lightweight anomaly detection system for black hole attack

A Abdelhamid, MS Elsayed, AD Jurcut, MA Azer - Electronics, 2023 - mdpi.com
Mobile ad hoc networks (MANETs) are now key in today's new world. They are critically
needed in many situations when it is crucial to form a network on the fly while not having the …

Adaptive routing in wireless mesh networks using hybrid reinforcement learning algorithm

S Mahajan, R Harikrishnan, K Kotecha - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless mesh networks are popular due to their adaptability, easy-setup, flexibility, cost,
and transmission time-reductions. The routing algorithm plays a vital role in transferring the …

A brief overview of security attacks and protocols in MANET

B Banerjee, S Neogy - 2021 IEEE 18th India Council …, 2021 - ieeexplore.ieee.org
Mobile Ad-hoc networks (MANETs) have become an important part of our day to day life.
Nowadays MANETs are used in battlefield applications, crisis management applications etc …