A Mechanism for Detecting the Intruder in the Network through a Stacking Dilated CNN Model

P Nirmala, T Manimegalai… - Wireless …, 2022 - Wiley Online Library
Rapid advancements in the technology and telecommunication areas have led to a massive
expansion of network density and information. As a consequence, numerous intruder …

A Novel Data Communication with Security Enhancement using Threat Management Scheme over Wireless Mobile Networks

G Anitha, P Nirmala, S Ramesh… - … on Advances in …, 2022 - ieeexplore.ieee.org
In the 21st Century, each and everyone needs a strong communication pathway to establish
their transactions in both commercial and non-commercial manner. Wireless …

Blockchain‐Based Secure Localization against Malicious Nodes in IoT‐Based Wireless Sensor Networks Using Federated Learning

GG Gebremariam, J Panda… - … and mobile computing, 2023 - Wiley Online Library
Wireless sensor networks are the core of the Internet of Things and are used in healthcare,
locations, the military, and security. Threats to the security of wireless sensor networks built …

DIWGAN optimized with Namib Beetle Optimization Algorithm for intrusion detection in mobile ad hoc networks

B Krishnasamy, L Muthaiah… - IETE Journal of …, 2023 - Taylor & Francis
Mobile ad hoc network (MANET) plays a major role in wireless devices such as defense and
flooding. Despite their smart applications, MANET faces more security issues than traditional …

Black hole attack detection using Dolphin Echo-location-based machine learning model in MANET environment

R Vatambeti, SV Mantena, KVD Kiran… - Computers and …, 2024 - Elsevier
Mobile ad hoc networks have surged in popularity in recent years and are now widely
regarded as critically important due to their low complexity and quick expansion. However, a …

Internet of Things Assisted Blockchain based Secured Cloud Data Maintenance Scheme

AM Ali, BRT Bapu, N Partheeban… - … on Advances in …, 2022 - ieeexplore.ieee.org
The term “Internet-of-Things (IoT)” has received a loT of interest nowadays. Blockchain has
previously been employed in IoT as a reliable, robust and decentralized way. Furthermore …

Study of Denial of Service Attack On AODV Routing Protocol in Mobile Ad-hoc Network

B Patel, R Patel - 2023 International Conference on Artificial …, 2023 - ieeexplore.ieee.org
As in the contemporary era, people used to use ad-hoc networks at manifold locations, and
they prefer to use them whenever they want, because they are facing situations from …

Design and analysis of photovoltaic solar based longer transmission of data in ADHOC networks

RK Kaushal, S Sasi, HK Sowmya, U Rajender… - Optical and Quantum …, 2023 - Springer
A multi-hop transitory non-central network is formed by a collection of mobile nodes in an PV
Adhoc network. These mobile nodes are equipped with wireless communication …

A Logical Data Security Establishment over Wireless Communications using Media based Steganographic Scheme

I Chandra, NA Kumar, NP Singh… - … on Electronics and …, 2022 - ieeexplore.ieee.org
Internet speeds and technological advancements have made individuals increasingly
concerned about their personal information being compromised by criminals. There have …

Efficient data transmission scheme using modified wireless communication protocol design

V Nagaraju, NJ Kumar, AM Ali… - … on Advances in …, 2022 - ieeexplore.ieee.org
In this digital world, each and every communication needs depends upon the wireless
communication model and every single individual as well as the firms highly dependent on …