Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

Stealthy attack detection in multi-channel multi-radio wireless networks

R Varatharajan, AP Preethi, G Manogaran… - Multimedia tools and …, 2018 - Springer
In recent years, the lack of network traffic analysis and flexible network topologies reduce the
performance of the multi-channel multi-radio wireless networks. As high scalability of its …

Securing mobile ad hoc networks: Challenges and solutions

S Kumar, K Dutta - International Journal of Handheld Computing …, 2016 - igi-global.com
The flexibility and openness of mobile ad hoc networks (MANETs) make them attractive for
various types of applications such as military communication, emergency search and rescue …

[PDF][PDF] Proactive Hybrid Intrusion Prevention System for Mobile Adhoc Networks.

SV Yerur, P Natarajan, TR Rangaswamy - International Journal of …, 2017 - inass.org
The open nature of Mobile Ad Hoc NETworks (MANETs) provides an opportunity for
intrusions. The current intrusion mechanisms are reactive and incapable of preventing the …

Intrusion detection technique for black hole attack in mobile ad hoc networks

S Kumar, K Dutta - International Journal of Information …, 2015 - inderscienceonline.com
A black hole attack is particularly harmful against routing in mobile ad hoc networks where a
malicious node tries to capture the path toward itself by falsely claiming a fresh and shortest …

Collaborative packet dropping intrusion detection in MANETs

G Ginnela, RK Saravanaguru - Recent Advances in Computer …, 2020 - ingentaconnect.com
Background: Wireless Networks treat Mobile Ad hoc Network as a network that requires no
preexisting infrastructure for setting up the network and is self-organized dynamically, which …

Optimizing Security Measures in Decentralized Mobile Networks with Neutrosophic Fuzzy Topology and PKI

AA Salama, MY Shams, R Bhatnagar… - 2023 3rd …, 2023 - ieeexplore.ieee.org
This study proposes a method to improve the security of decentralized mobile networks
using Neutrosophic Fuzzy Local Function Algorithms D*, B*, and A* to optimize the decision …

Integrated Random Seed and Data-dependent Dynamic Key Generation for Security in Mobile Ad hoc Networks

R Sasikumar, DR Vaman, PS Lal - 2023 9th International …, 2023 - ieeexplore.ieee.org
This paper presents random seed and data dependent dynamic key generation algorithm for
secure end-to-end transport of data in a clustered Mobile Ad Hoc Network (MANET) …

Radio frequency identification and mobile ad-hoc network: Theories and applications

K Kasemsap - Handbook of research on recent developments in …, 2017 - igi-global.com
This chapter explains the components of Radio Frequency Identification (RFID); the aspects
of RFID; the barriers to RFID utilization; the privacy and security issues of RFID; the RFID …