Hidden Markov trust for attenuation of selfish and malicious nodes in the IoT network

G Joshi, V Sharma - Wireless Personal Communications, 2023 - Springer
The exposure of IoT nodes to the internet makes them vulnerable to malicious attacks and
failures. These failures affect the survivability, integrity, and connectivity of the network. Thus …

Light-weight hidden markov trust evaluation model for iot network

G Joshi, V Sharma - 2021 Fifth International Conference on I …, 2021 - ieeexplore.ieee.org
The open-ended nature of the Internet of Things (IoT) had whipped them vulnerable to a
variety of attacks, therefore the need of securing and stabilizing the network while keeping …

[PDF][PDF] Intrusion Detection System Using SVM as Classifier and GA for Optimizing Feature Vectors

H Gharaee, M Fekri, H Hosseinvand - International Journal of Information and …, 2018 - sid.ir
Nowadays, IDS is an essential technology for defense in depth. Researchers have
interested on IDS using data mining and artificial intelligence (AI) techniques as an artful …

Novel Intrusion Detection System for MANETs using Hybrid Improved Grey Wolf Optimizer based deep recurrent neural network model

R SATHIYA, N YUVARAJ - 2023 - researchsquare.com
The advent growth of wireless networks and their applications in different fields has been
more prominent in the previous few years and specifically mobile ad-hoc networks …

[PDF][PDF] HA-SDT: HYBRID AUTHENTICATION BASED SECURE DATA TRANSMISSION FRAMEWORK FOR MOBILE AD-HOC NETWORKS

AR Devi, S Venkatesan, K Krishnaveni… - academia.edu
ABSTRACT Providing security to Mobile Ad-hoc Networks (MANETs) is one of the essential
and demanding task in recent days, due to the mobility of nodes. Typically, the malicious or …