Recent advancements, review analysis, and extensions of the AODV with the illustration of the applied concept

TK Saini, SC Sharma - Ad Hoc Networks, 2020 - Elsevier
Mobile ad hoc networks provide a promising opportunity for the applications requiring
instant networking in the resource constraint, multi-hop wireless environment. Routing …

Cluster-based classical routing protocols and authentication algorithms in WSN: a survey based on procedures and methods

RK Yadav, R Mishra - Wireless Personal Communications, 2022 - Springer
Wireless sensor system (WSN) is an assortment of miniature sensor knobs with some
limitations. But in today's world, we are searching for the approach which provides cost …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

OPTIMIST: lightweight and transparent IDS with optimum placement strategy to mitigate mixed-rate DDoS attacks in IoT networks

P Bhale, DR Chowdhury, S Biswas… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Distributed Denial-of-Service (DDoS) attacks are widespread for Internet of Things (IoT)
systems that aim to disrupt the availability of a system completely (high-rate DDoS) or …

An EDRI-based approach for detecting and eliminating cooperative black hole nodes in MANET

A Dorri - Wireless Networks, 2017 - Springer
Abstract Mobile Ad hoc Network (MANET) is a self-configurable, self-maintenance network
with wireless, mobile nodes. Special features of MANET like dynamic topology, hop-by-hop …

A sequence number based bait detection scheme to thwart grayhole attack in mobile ad hoc networks

RH Jhaveri, NM Patel - Wireless Networks, 2015 - Springer
Wireless shared medium, randomly moving nodes and multi-hop architecture make mobile
ad hoc networks vulnerable to various network layer threats. Grayhole attack is such a …

STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET

MBM Kamel, I Alameri… - 2017 IEEE 2nd Advanced …, 2017 - ieeexplore.ieee.org
Mobile ad hoc networks (MANET) is a type of networks that consists of autonomous nodes
connecting directly without a top-down network architecture or central controller. Absence of …

On security against pollution attacks in network coding enabled 5g networks

VA Vasudevan, C Tselios, I Politis - IEEE Access, 2020 - ieeexplore.ieee.org
Future communication networks need to harness the available spectrum more efficiently to
cater the requirements of the ever-increasing digital devices. Higher data rate with low …

Literature review of routing attacks in MANET

RK Singh, P Nand - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Mobile Ad-hoc Network (MANET) is based on the routing algorithm which adapts the
random changes that may occur in the network topology. MANET is the network with the …

DEBH: detecting and eliminating black holes in mobile ad hoc network

A Dorri, S Vaseghi, O Gharib - Wireless Networks, 2018 - Springer
Security in mobile ad hoc network (MANET) is one of the key challenges due to its special
features eg hop-by-hop communications, dynamic topology, and open network boundary …