BP-AODV: Blackhole protected AODV routing protocol for MANETs based on chaotic map

AM El-Semary, H Diab - IEEE Access, 2019 - ieeexplore.ieee.org
Even though the ad-hoc on-demand distance vector (AODV) is a broadly used routing
protocol for mobile ad-hoc networks (MANETs), it is vulnerable to a blackhole attack. Lu et …

[PDF][PDF] Naïve Bayes classifier to mitigate the DDoS attacks severity in ad-hoc networks

KG Reddy, PS Thilagam - International Journal of Communication …, 2020 - researchgate.net
Ad-Hoc networks are becoming more popular due to their unique characteristics. As there is
no centralized control, these networks are more vulnerable to various attacks, out of which …

Survey of interoperability challenges in the internet of vehicles

P Agbaje, A Anjum, A Mitra, E Oseghale… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) is an active area for innovation and an essential tool in
achieving smart cities through the integration of vehicles with the Internet of Things (IoT). IoV …

Intelligent ad-hoc-on demand multipath distance vector for wormhole attack in clustered WSN

S Singh, HS Saini - Wireless Personal Communications, 2022 - Springer
Abstract In Wireless Senor Networks, security is the most significant issue when sending
such an essential message via wireless connection. This helps attackers to access the …

A fuzzy based co-operative blackmailing attack detection scheme for edge computing nodes in MANET-IOT environment

SV Simpson, G Nagarajan - Future Generation Computer Systems, 2021 - Elsevier
Smart cities have been developed with the help of large scale Internet of Things (IoT) device
deployment. Under the combination of IoT and traditional Mobile ad-hoc network, the …

Modified DSR protocol for detection and removal of selective black hole attack in MANET

M Mohanapriya, I Krishnamurthi - Computers & Electrical Engineering, 2014 - Elsevier
A black hole attack in ad hoc network refers to an attack by malicious nodes, which forcibly
acquires the route from a source to destination by falsely advertising shortest hop count to …

SUPERMAN: security using pre-existing routing for mobile ad hoc networks

D Hurley-Smith, J Wetherall… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
The flexibility and mobility of Mobile Ad hoc Networks (MANETs) have made them
increasingly popular in a wide range of use cases. To protect these networks, security …

Survey of wormhole attack in wireless sensor networks

U Ghugar, J Pradhan - Computer Science and Information …, 2021 - 85.187.128.170
From the last decade, a wireless sensor network (WSN) has a very important role over the
networks. The primary features of WSN include satellite communication, broadcast channel …

A survey of black-hole attack mitigation techniques in MANET: merits, drawbacks, and suitability

S Gurung, S Chauhan - Wireless Networks, 2020 - Springer
Abstract Mobile Ad-hoc Network (MANET) is a prominent technology in the wireless network
in which the mobile nodes operate in a distributed manner and collaborate with each other …

Network layer attacks and countermeasures in cognitive radio networks: A survey

M Bouabdellah, N Kaabouch, F El Bouanani… - Journal of information …, 2018 - Elsevier
Spectrum scarcity is the principal motivation behind the development of cognitive radio. This
technology introduces new functionalities at the physical, medium access control, and …