[HTML][HTML] The security of big data in fog-enabled IoT applications including blockchain: A survey

N Tariq, M Asim, F Al-Obeidat, M Zubair Farooqi… - Sensors, 2019 - mdpi.com
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

A trust computed framework for IoT devices and fog computing environment

G Rathee, R Sandhu, H Saini, M Sivaram… - Wireless …, 2020 - Springer
In this paper, we have demoralized the transmission processing concerns of fog nodes and
IoT device layer attack during the handoff (mobility) of IoT devices in the fog environment. A …

Trust routing protocol based on cloud-based fuzzy petri net and trust entropy for mobile ad hoc network

X Wang, P Zhang, Y Du, M Qi - IEEE Access, 2020 - ieeexplore.ieee.org
The trust-based routing mechanisms are proposed to enhance the security of the mobile ad
hoc network (MANET), which use the performance metrics of a node to evaluate the trust …

New approach through detection and prevention of wormhole attack in MANET

R Verma, R Sharma, U Singh - 2017 international conference …, 2017 - ieeexplore.ieee.org
A Local Area Network (LAN) consists of wireless mobile nodes that can communicate with
each other through electromagnetic radio waves. Mobile Ad hoc Network (MANET) consists …

Cluster-based technique for detection and prevention of black-hole attack in MANETs

VK Saurabh, R Sharma, R Itare… - 2017 International …, 2017 - ieeexplore.ieee.org
Secure routing in the field of mobile ad hoc network (MANET) is one of the most flourishing
areas of research. Devising a trustworthy security protocol for ad hoc routing is a challenging …

Support vector machine through detecting packet dropping misbehaving nodes in MANET

R Parihar, A Jain, U Singh - 2017 International conference of …, 2017 - ieeexplore.ieee.org
Mobile ad-hoc network (MANET) is suffering from various attacks due to its infrastructure-
less characteristics. Hence, MANET needs a variety of specific security methods to detect the …

Detection of black hole attack in mobile ad hoc network using adaptive approach

L Baghel, P Mishra, M Samvatsar… - 2017 International …, 2017 - ieeexplore.ieee.org
For the mobile ad hoc networks (MANET) security is a vital element. For providing security
against malicious nodes all the researchers are striving specially and particularly on all the …

Identifying and detecting black hole and gray hole attack in MANET using gray wolf optimization

R Vatambeti, KS Supriya… - International Journal of …, 2020 - Wiley Online Library
Mobile ad hoc networks (MANETs) become most vibrant and are widely used in various
applications, including military, commercial sectors, and personal area networks. However …

A modified AODV protocol to detect and prevent the wormhole usingh using hybrid technique

AS Chouhan, V Sharma, U Singh… - 2017 International …, 2017 - ieeexplore.ieee.org
In Mobile Ad hoc Network (MANET), mobile node is responsible for the route establishment
using a wireless link where each node behaves like both, as a host and a router. There are …