RK Dhanaraj, RH Jhaveri, L Krishnasamy… - … Journal of Uncertainty …, 2021 - World Scientific
In today's world, one of the most severe attacks that wireless sensor networks (WSNs) face is a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks …
G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for infrastructure, high speed in setting up the network, and no need for centralized …
MI Talukdar, R Hassan, MS Hossen… - Wireless …, 2021 - Wiley Online Library
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly, where there is no central administration. They are prone to different types of attacks such as …
Numerous network can be connected by using the mobile ad hoc network. It can have security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole …
SR Zahra, MA Chishti - Neural Computing and Applications, 2022 - Springer
Inspired by the massive surge of interest in the Internet of Things (IoT), this work focuses on the kinetics of its security. By automating everything, starting from baby monitors to life …
P Singh, M Khari, S Vimal - Wireless Personal Communications, 2022 - Springer
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need wireless connectivity regardless of their geographical location. Threats of security attacks …
S Shekhar, M Mahajan, S Kaur - 2022 6th International …, 2022 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETS) have gained much attention due to their dynamic nature and efficiency. These networks are operated in highly dynamic and unpredictable …
Mobile ad-hoc network is an assortment of distinct attribute-based mobile devices that are autonomous and are cooperative in establishing communication. These nodes exploit …
Security is a fundamental prerequisite in self‐evolvability network and providing that in any situation is the most problematic task as the network is highly dynamic with no trusted …