Preamble time-division multiple access fixed slot assignment protocol for secure mobile ad hoc networks

KH Mohammadani, KA Memon… - International …, 2020 - journals.sagepub.com
Mobile ad hoc networks are the “spontaneous networks” which create a temporary network
in any place and any time without using any extra fixed radio device of a full infrastructure …

[PDF][PDF] Remote monitoring of an object using a wireless sensor network based on NODEMCU ESP8266

H Ouldzira, A Mouhsen, H Lagraini… - Indonesian Journal of …, 2019 - academia.edu
In recent years, wireless sensors networks (WSNs) have been imposed as an effective
means of interconnection with simultaneous communication and information processing …

[PDF][PDF] Optimized machine learning algorithm for intrusion detection

RAI Alhayali, M Aljanabi, AH Ali… - Indonesian Journal of …, 2021 - academia.edu
Intrusion detection is mainly achieved by using optimization algorithms. The need for
optimization algorithms for intrusion detection is necessitated by the increasing number of …

A new efficient approach for detecting single and multiple black hole attacks

R Khalladi, M Rebbah, O Smail - The Journal of Supercomputing, 2021 - Springer
Abstract Mobile Ad hoc NETworks (MANET) are networks without infrastructure. The
communication range among nodes is limited, where several hops are needed to transmit a …

[PDF][PDF] Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques.

O Barki, Z Guennoun, A Addaim - … of Electrical & …, 2020 - download.garuda.kemdikbud.go.id
Multi Point Relays (MPRs) are those nodes that are calculated and determined by the
Optimized Link State Routing protocol (OLSR) in order to minimize and avoid overload …

[PDF][PDF] Intrusion detection system based m-best features selection in manet

R Khalladi, M Rebbah, O Smail - Journée Scientifique des …, 2022 - researchgate.net
MANETs networks are mobile units interconnected between them without infrastructures
which make them vulnerable to different types of attacks. Although several techniques have …

An Extensive Analysis of Flying Ad-Hoc Network Applications and Routing Protocols in Agriculture

A Ghosh, C Mistry, M Biswas - Artificial Intelligence Applications in …, 2022 - igi-global.com
Agriculture and irrigation are sources of man's potential. For the sake of cost-effectiveness
and the betterment of agricultural professionals, UAVs (unmanned aerial vehicles) can be …

A YANG-aided Unified Strategy for Black Hole Detection for Backbone Networks

E Ak, K Kaya, E Ozaltun, SG Oguducu… - arXiv preprint arXiv …, 2024 - arxiv.org
Despite the crucial importance of addressing Black Hole failures in Internet backbone
networks, effective detection strategies in backbone networks are lacking. This is largely …

An improved performance routing protocol based on delay for MANETs in smart cities

VK Quy, MC Pham, AN Le - International Journal of Electrical …, 2022 - search.proquest.com
Mobile ad-hoc networks (MANETs) is a set of mobile devices that can self-configuration, self-
established parameters to transmission in-network. Although limited inability, MANETs have …

Authenticated and trusted AODV (ATAODV) routing protocol to detect blackhole attack in MANET-based military environments

P Kannimuthu - International Journal of Interdisciplinary …, 2021 - igi-global.com
In this paper, an authenticated and trusted AODV (ATAODV) routing protocol is proposed to
identify and eliminate the black attack and form the trusted route in MANET-based military …