[PDF][PDF] Internet of things enabled vehicular and ad hoc networks for smart city traffic monitoring and controlling: a review

A Sharif, JP Li, MA Saleem - International Journal of Advanced …, 2018 - researchgate.net
----------------------------------------------------------------------ABSTRACT----------------------------------------
-------------------Traffic Congestion is becoming a huge issue in the cities of both developing …

[PDF][PDF] The diverse technology of MANETs: a survey of applications and challenges

F Safari, I Savić, H Kunze, D Gillis - Int. J. Future Comput. Commun, 2023 - ijfcc.org
In recent years, mobile ad hoc networks (MANETs) have shown much potential in providing
wireless network solutions for a variety of situations. MANETs are made up of a variety of …

Performance evaluation of three mobile ad-hoc network routing protocols in different environments

AM Shantaf, S Kurnaz… - … Congress on Human …, 2020 - ieeexplore.ieee.org
Mobile ad-hoc wireless networks give us the high probability and high properties to create
networks, without any central management or infrastructure, independent and temporary …

APD-JFAD: accurate prevention and detection of jelly fish attack in MANET

S Doss, A Nayyar, G Suseendran, S Tanwar… - Ieee …, 2018 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are surrounded by tons of different attacks, each with
different behavior and aftermaths. One of the serious attacks that affect the normal working of …

A novel cross-layer adaptive fuzzy-based ad hoc on-demand distance vector routing protocol for MANETs

F Safari, H Kunze, J Ernst, D Gillis - IEEE Access, 2023 - ieeexplore.ieee.org
One of the essential processes in Mobile Ad hoc Networks (MANETs) is blind flooding to
discover routes between source and destination mobile nodes. As the density of nodes in …

[HTML][HTML] Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

Energy aware stable multipath disjoint routing based on accumulated trust value in MANETs

SM Benakappa, M Kiran - International Journal of Computer …, 2022 - search.proquest.com
Conserving energy and finding the stable path are the two vital issues in Mobile Ad Hoc
Networks (MANETs) as the prior increases the network lifetime and the later increases the …

[PDF][PDF] Performance analysis of black hole and worm hole attacks in MANETs

MH Al Rubaiei, HS Jassim… - International Journal of …, 2022 - researchgate.net
A Mobile Ad Hoc Network MANET is compost of freely and mobility set of mobile nodes.
They form a temporary dynamic wireless network without any infrastructure. Since the nodes …

A trusted MANET routing algorithm based on fuzzy logic

QM Yas, M Khalaf - International Conference on Applied Computing to …, 2019 - Springer
MANET wireless network changes network topology continuously and dynamically due to
the absence of infrastructure and central control. Typically, this network used for areas …

Using MANET in IoT healthcare applications: a survey

HED Mohamed, H Azmi, S Taha - International Journal of …, 2021 - journals.uob.edu.bh
Internet of Things (IoT) is an innovative technology and an efficient solution that facilitates
the real-time interconnection within physical devices through heterogeneous networks …