Security issues in mobile ad hoc network

N Islam, ZA Shaikh - Wireless Networks and Security: Issues, Challenges …, 2013 - Springer
Abstract Mobile Ad hoc Networks (MANET) are infrastructure-less networks characterized by
lack of prior configuration and the hostile environments. Their unique properties make them …

FCM technique for efficient intrusion detection system for wireless networks in cloud environment

M Chen, N Wang, H Zhou, Y Chen - Computers & Electrical Engineering, 2018 - Elsevier
With the emergence of ad-hoc networks, the communication methods in the field of wireless
have greatly developed. A great deal of research has been conducted, especially in mobile …

[PDF][PDF] Adaptive Anomaly-Based Intrusion Detection System Using Fuzzy Controller.

F Geramiraz, AS Memaripour, M Abbaspour - Int. J. Netw. Secur., 2012 - ijns.jalaxy.com.tw
The main feature of anomaly-based intrusion detection systems is detection of new attacks
in the networks, even though numerous false alarms are caused in order to disregard this …

An efficient authentication protocol for mobile communications

CC Lee, IE Liao, MS Hwang - Telecommunication Systems, 2011 - Springer
In this paper, a new Global System of Mobile Communications (GSM) authentication
protocol is proposed to improve some drawbacks of the current GSM authentication protocol …

[PDF][PDF] A Cloud FCM based intrusion detection model in a MANET environment

JS Manoharan, P Muralidharan, G Jayaseelan - International Journal for …, 2017 - ijrdt.org
With the advent of ad-hoc networks, there has been a great boost in communication
methodologies in the wireless domain. Numerous research contributions have been made …

[PDF][PDF] An efficient and secure communication scheme for trusted computing environments

CT Li - Journal of Computers, 2009 - 203.68.184.3
Trusted computing and communications have gradually become an important part of e-
business and e-government, including various distributed systems, network applications …

[HTML][HTML] Fuzzy Based Detection And Swarm Based Authenticated Routing In Manet

K Shanthi, T Jebarajan, P Sampath, W AMITABH… - Journal of Theoretical …, 2014 - jatit.org
In mobile ad hoc networks (MANET), Artificial Intelligence (AI) based distributed intrusion
detection (DIDS) techniques are very rarely available. In general, these techniques are used …

[图书][B] Securing Communication Paths in Mobile Ad Hoc Networks: Monitoring and Surveillance of Routing Algorithms By Mrs Jayashree S Patil, Associate. Professor …

MJS Patil, G Narayanamma, KVN Sunitha - books.google.com
In recent years, the rapid proliferation of mobile devices has led to the widespread adoption
of Mobile Ad Hoc Networks (MANETs). These networks, which operate without the need for …

[PDF][PDF] Trust and Fuzzy-Ant Colony Optimization based Intrusion Detection System for Secure Routing of MANET

R Kondaiah, B Sathyanarayana - 2018 - academia.edu
Mobile Ad-Hoc Network (MANET) is a specific type of wireless network that is infrastructure
less, dynamic and self-organizing and self-configuring multi-hop wireless network. Nodes …

[引用][C] Review of MANET Utilization for Watermarking Algorithms

MT Sultan, KN Yasen - Journal of Engineering Research and Application, 2017