Light-weight trust-based routing protocol for mobile ad hoc networks

N Marchang, R Datta - IET information security, 2012 - IET
Mobile ad hoc networks (MANETs) were originally designed for a cooperative environment.
To use them in hostile environments, trust-based routing can be used, where instead of …

An adaptive approach for detection of blackhole attack in mobile ad hoc network

V Kumar, R Kumar - Procedia Computer Science, 2015 - Elsevier
Security is an essential component for mobile ad hoc network (MANET). In order to provide
security against attacker, researchers are working specifically on the security challenges in …

Study of detecting and overcoming black hole attacks in MANET: A review

D Khan, M Jamil - … on Wireless Systems and Networks (ISWSN), 2017 - ieeexplore.ieee.org
Mobile Ad-hoc Networks (MANETs) are networks in which nodes configure themselves in
dynamic topology without any centralized system. MANET's nodes communicate with each …

Accurate and cognitive intrusion detection system (ACIDS): a novel black hole detection mechanism in mobile ad hoc networks

S Sivanesh, VRS Dhulipala - Mobile Networks and Applications, 2021 - Springer
Abstract Mobile Ad-hoc Network (MANETs) is infrastructure less in nature as it is
encompassed with a collection of mobile nodes. The self-configurable feature of it has …

Lightweight reputation-based approach against simple and cooperative black-hole attacks for MANET

A Hammamouche, M Omar, N Djebari, A Tari - Journal of information …, 2018 - Elsevier
Ad hoc network is a set of mobile nodes interconnected by wireless communication. It is
easily and less expensive to deploy, but it is vulnerable against various attacks. The node …

AODV-based secure routing against blackhole attack in MANET

SR Deshmukh, PN Chatur… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
Utilization of mobile devices are burgeoning rapidly and consequently mobile ad-hoc
networks (MANETs). The self configuring and infrastructure less property of MANETs makes …

A physical process for recycling and reusing waste printed circuit boards

M Peng, W Layiding, X Dong… - … on Electronics and …, 2004 - ieeexplore.ieee.org
This paper presents a practical physical process for recycling waste printed circuit boards
(PCBs) as well as the reusing process for epoxy resin recovered from PCBs. A special …

Unifying DVFS and offlining in mobile multicores

A Carroll, G Heiser - 2014 IEEE 19th Real-Time and …, 2014 - ieeexplore.ieee.org
Energy efficiency is a primary design criterion of the modern smartphone due to limitations in
battery capacity. Multi-core processors are now commonplace in these devices, which adds …

Analysis and countermeasures of black-hole attack in manet by employing trust-based routing

S Naveena, C Senthilkumar… - 2020 6th international …, 2020 - ieeexplore.ieee.org
A self-governing system consisting of mobile nodes that exchange information within a
cellular area and is known as a mobile ad hoc network (MANET). Due to its dynamic nature …

Blackhole attack detection and prevention by real time monitoring

D Kshirsagar, A Patil - 2013 Fourth International Conference …, 2013 - ieeexplore.ieee.org
Adhoc network is a temporary network formed to share data among nodes. Network is
constrained about resources and always has threat from malicious nodes. Blackhole attack …