Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET

S Shafi, S Mounika, S Velliangiri - Procedia Computer Science, 2023 - Elsevier
The latest advancements in wireless communication promotes the researchers to
concentrate more in the expansion of Mobile Ad hoc Networks (MANETs), where nodes …

[PDF][PDF] Intrusion prevention system using convolutional neural network for wireless sensor network

PR Chandre, P Mahalle, G Shinde - IAES International Journal of Artificial …, 2022 - viit.ac.in
Now-a-days, there is exponential growth in the field of wireless sensor network. In wireless
sensor networks (WSN's), most of communication happen through wireless media hence …

Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET

R Reka, R Karthick, RS Ram, G Singh - Computers & Security, 2024 - Elsevier
Designing of intrusion detection system (IDS), and mobile ad hoc networks (MANET)
prevention technique with examined detection rate, memory consumption with minimum …

A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks

S Shekhar, M Mahajan, S Kaur - 2022 6th International …, 2022 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETS) have gained much attention due to their dynamic nature
and efficiency. These networks are operated in highly dynamic and unpredictable …

Improving routing disruption attack detection in MANETs using efficient trust establishment

KAP Yamini, J Stephy, K Suthendran… - Transactions on …, 2022 - Wiley Online Library
Security is a fundamental prerequisite in self‐evolvability network and providing that in any
situation is the most problematic task as the network is highly dynamic with no trusted …

An Overview of Game Theory Approaches for Mobile Ad-hoc Networks' Security

H Messabih, CA Kerrache, Y Cheriguene… - IEEE …, 2023 - ieeexplore.ieee.org
The issue of cybersecurity has gained significant prominence in the context of safeguarding
the privacy and integrity of information, especially with the increasing prevalence of …

Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs

VR Sugumaran, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
This paper focuses on achieving high-level security in Mobile Adhoc Networks (MANET) by
incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing …

Intensive analysis of intrusion detection methodology over Mobile Adhoc Network using machine learning strategies

MV Rajesh - Materials today: proceedings, 2022 - Elsevier
Abstract Mobile Adhoc Network (MANET) recently gained prominence due to the prevalence
of handheld connectivity and their flexibility to supportability in specific non-permanent and …

Performance analysis of AODV and SAODV routing protocol using SVM against black hole attack

S Kaushik, K Tripathi, R Gupta… - 2022 2nd International …, 2022 - ieeexplore.ieee.org
This paper presents the performance analysis of Ad-hoc-on-Demand Distance Vector
(AODV) and Secure Ad-hoc-on-Demand Distance Vector (SAODV) protocol for packets …