The limitations in the state-of-the-art counter-measures against the security threats in H-IoT

YA Qadri, R Ali, A Musaddiq, F Al-Turjman, DW Kim… - Cluster …, 2020 - Springer
Abstract Internet of Things (IoT) technology is anticipated to pave the way for
groundbreaking applications in a number of areas of current healthcare systems. Given the …

Functional model of adaptive network topology of large-scale systems based on dynamical graph theory

EY Pavlenko - Automatic Control and Computer Sciences, 2022 - Springer
A model that can describe the functioning of large-scale systems with a dynamical and
adaptive network topology is developed. Dynamical graph theory is chosen as the …

Honeypot based black-hole attack confirmation in a MANET: black-hole attack confirmation

DSK Tiruvakadu, V Pallapa - International Journal of Wireless Information …, 2018 - Springer
Many solutions are proposed to identify or prevent the attacks in a Mobile Ad hoc Network.
However, sometimes these systems detect false attacks. This could lead to loss of resources …

A Survey: Comparative study of security methods and trust manage solutions in MANET

S Muruganandam, JA Renjit… - 2019 Fifth International …, 2019 - ieeexplore.ieee.org
A Manet is formed by a set of infrastructure less mobile nodes, these nodes are
independently exchanging information one mobile node to another mobile node over a …

Wormhole Attack Detection Technques In MANET

M Bashir, S Tahir, MF Almufareh… - … on Business Analytics …, 2023 - ieeexplore.ieee.org
MANET is a wireless medium, with no infrastructure, for nodes to communicate within a
network. Movement of nodes is a lot more in this network than other networks due to lack of …

Security boundaries of mobile adhoc network: A systematic literature review and future aspects

MK Brar, S Singh, S Singh - AIP Conference Proceedings, 2024 - pubs.aip.org
Technological advancement makes human life more manageable in different aspects, and
several variants are available to provide the same. Wireless communication helps to transfer …

Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks

C Kumar, S Prakash - Security and Privacy Issues in IoT Devices and …, 2021 - Elsevier
Abstract By 2020, Cisco Inc. predicted that there will be around 50 billion connected devices
across the world. The heterogeneity among devices, the variation in the level of security …

[PDF][PDF] Review of Wormhole Attack on Mobile Ad-hoc Network

M Badgujar, L Jat - Tech Scholar Deepak, and Lokendra Jat, 2022 - ijsret.com
WSNs are unstable because to the wireless nature of communication since any attacker with
the desire to steal the data may do so by inserting rogue nodes into the network. Attackers …

[PDF][PDF] International Journal of Advanced Trends in Computer Science and Engineering

GG Kumar, SI Khan, MM Basha - International Journal, 2019 - academia.edu
The drift of the concept is the critical goal of data mining over data transmission, which often
deotes the diversity between the pair of sequentially transmitted data tuples. The drift of the …

Detection of Wormhole Attacks Using the DCNNBiLSTM Model to Secure the MANET

B Rajalakshmi, RJ Anandhi, K Moorthi… - … on Computing and …, 2023 - Springer
The obvious response to an anytime, anywhere network in the current era of heterogeneous
networks is MANET. It is a collection of wirelessly communicative mobile gadgets that …