Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

Contradiction based gray-hole attack minimization for ad-hoc networks

N Schweitzer, A Stulman, RD Margalit… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.),
detection & mitigation techniques only function after the attack has commenced. Prevention …

Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET

S Gurung, S Chauhan - Wireless Networks, 2019 - Springer
The recent development in wireless communication technology and portable devices has
led to the development of Mobile Ad-Hoc Network which has unique features such as …

An authentication protocol for future sensor networks

M Bilal, SG Kang - Sensors, 2017 - mdpi.com
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …

A dynamic threshold based approach for mitigating black-hole attack in MANET

S Gurung, S Chauhan - Wireless Networks, 2018 - Springer
Mobile ad-hoc network is an infrastructure less type of network which does not require any
kind of fixed infrastructure. It provides multi-hop communication between the source and …

A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET

S Gurung, S Chauhan - Wireless Networks, 2019 - Springer
Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic
network topology, open medium, multi-hop communication etc. in which each device not …

Survey of secure routing protocols for wireless ad hoc networks

M Boulaiche - Wireless Personal Communications, 2020 - Springer
The diverse network technologies and low-end wireless technologies have enabled the
deployment of self-organized wireless ad hoc networks. Nodes forming such networks have …