A novel support vector machine based intrusion detection system for mobile ad hoc networks

EA Shams, A Rizaner - Wireless Networks, 2018 - Springer
The performance of mobile ad hoc networks (MANETs) is significantly affected by the
malicious nodes. One of the most common attacks in MANETs is denial of service (DoS); a …

Trust based routing mechanism for securing OSLR-based MANET

S Tan, X Li, Q Dong - Ad Hoc Networks, 2015 - Elsevier
A mobile ad hoc network (MANET) is a kind of infrastructure-less wireless network that is self-
organized by mobile nodes communicating with each other freely and dynamically. MANET …

Improved grey relational analysis-based TOPSIS method for cooperation enforcing scheme to guarantee quality of service in MANETs

S Jagatheswari, P Ramalingam… - International Journal of …, 2022 - Springer
Mobile ad hoc network (MANET) is a self-configuring and infrastructure less network in
which the nodes are considered to move autonomously through the interfaces of wireless …

A trust management system for securing data plane of ad-hoc networks

S Tan, X Li, Q Dong - IEEE Transactions on Vehicular …, 2015 - ieeexplore.ieee.org
The rapidly developing ad-hoc network technology has a wide range of applications, such
as vehicular ad-hoc networks (VANETs), wireless sensor networks (WSNs), and emergency …

M‐LionWhale: multi‐objective optimisation model for secure routing in mobile ad‐hoc network

RM Chintalapalli, VR Ananthula - IET Communications, 2018 - Wiley Online Library
Mobile ad‐hoc network (MANET) is an emerging technology that comes under the category
of wireless network. Even though the network assumes that all its mobile nodes are trusted …

Survey of secure routing protocols for wireless ad hoc networks

M Boulaiche - Wireless Personal Communications, 2020 - Springer
The diverse network technologies and low-end wireless technologies have enabled the
deployment of self-organized wireless ad hoc networks. Nodes forming such networks have …

Mitigating denial of service attacks in OLSR protocol using fictitious nodes

N Schweitzer, A Stulman, A Shabtai… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET)
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …

Multipath security aware routing protocol for MANET based on trust enhanced cluster mechanism for lossless multimedia data transfer

VS Devi, NP Hegde - Wireless Personal Communications, 2018 - Springer
The dynamic nature of mobile nodes of ad hoc network is mostly affected by security
problems which reduce data forwarding rate in multimedia sources. Due to the rapid growth …

Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization

C Ram Mohan, VR Ananthula - International Journal of Modeling …, 2019 - World Scientific
The advancements in Mobile Ad-hoc Network (MANET) are suitable to wide applications,
which involve military applications, civilian domains, and disaster recovery systems. It is …

Denial of service attack solution in OLSR based manet by varying number of fictitious nodes

R Bhuvaneswari, R Ramachandran - Cluster Computing, 2019 - Springer
Abstract The Mobile Ad Hoc Network (MANET) is formed by group of mobile nodes and such
group of nodes is flexible in creating links with the other nodes in the network frequently. The …