Wireless body area network (WBAN): A survey on architecture, technologies, energy consumption, and security challenges

M Yaghoubi, K Ahmed, Y Miao - Journal of Sensor and Actuator Networks, 2022 - mdpi.com
Wireless body area networks (WBANs) are a new advance utilized in recent years to
increase the quality of human life by monitoring the conditions of patients inside and outside …

Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm

RK Dhanaraj, RH Jhaveri, L Krishnasamy… - … Journal of Uncertainty …, 2021 - World Scientific
In today's world, one of the most severe attacks that wireless sensor networks (WSNs) face is
a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks …

Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks

G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …

Performance improvements of AODV by black hole attack detection using IDS and digital signature

MI Talukdar, R Hassan, MS Hossen… - Wireless …, 2021 - Wiley Online Library
In mobile ad hoc networks (MANETs), mobile devices connect with other devices wirelessly,
where there is no central administration. They are prone to different types of attacks such as …

Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET

M Shukla, BK Joshi, U Singh - Wireless Personal Communications, 2021 - Springer
Numerous network can be connected by using the mobile ad hoc network. It can have
security attacks like the worm hole, denial of service attack, jellyfish and also the blackhole …

A generic and lightweight security mechanism for detecting malicious behavior in the uncertain Internet of Things using fuzzy logic-and fog-based approach

SR Zahra, MA Chishti - Neural Computing and Applications, 2022 - Springer
Inspired by the massive surge of interest in the Internet of Things (IoT), this work focuses on
the kinetics of its security. By automating everything, starting from baby monitors to life …

EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT

P Singh, M Khari, S Vimal - Wireless Personal Communications, 2022 - Springer
Mobile ad hoc networks are attaining popularity to its highest currently, as the users need
wireless connectivity regardless of their geographical location. Threats of security attacks …

A Comprehensive Review of Various Attacks in Mobile Ad Hoc Networks

S Shekhar, M Mahajan, S Kaur - 2022 6th International …, 2022 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETS) have gained much attention due to their dynamic nature
and efficiency. These networks are operated in highly dynamic and unpredictable …

A recurrent reward based learning technique for secure neighbor selection in mobile AD-HOC networks

KS Sankaran, N Vasudevan, KR Devabalaji… - IEEE …, 2021 - ieeexplore.ieee.org
Mobile ad-hoc network is an assortment of distinct attribute-based mobile devices that are
autonomous and are cooperative in establishing communication. These nodes exploit …

Improving routing disruption attack detection in MANETs using efficient trust establishment

KAP Yamini, J Stephy, K Suthendran… - Transactions on …, 2022 - Wiley Online Library
Security is a fundamental prerequisite in self‐evolvability network and providing that in any
situation is the most problematic task as the network is highly dynamic with no trusted …