A study on different deep learning algorithms used in deep neural nets: MLP SOM and DBN

J Naskath, G Sivakamasundari, AAS Begum - Wireless personal …, 2023 - Springer
Deep learning is a wildly popular topic in machine learning and is structured as a series of
nonlinear layers that learns various levels of data representations. Deep learning employs …

AI-based wormhole attack detection techniques in wireless sensor networks

M Hanif, H Ashraf, Z Jalil, NZ Jhanjhi, M Humayun… - Electronics, 2022 - mdpi.com
The popularity of wireless sensor networks for establishing different communication systems
is increasing daily. A wireless network consists of sensors prone to various security threats …

Localization and detection of multiple attacks in wireless sensor networks using artificial neural network

GG Gebremariam, J Panda… - … and Mobile Computing, 2023 - Wiley Online Library
Security enhancement in wireless sensor networks (WSNs) is significant in different
applications. The advancement of routing attack localization is a crucial security research …

Advanced Intrusion Detection in MANETs: A Survey of Machine Learning and Optimization Techniques for Mitigating Black/Gray Hole Attacks

SM Hassan, MM Mohamad, FB Muchtar - IEEE Access, 2024 - ieeexplore.ieee.org
Mobile Ad Hoc Networks (MANETs) are dynamic networks without fixed infrastructure,
making them particularly vulnerable to security threats such as black and gray hole attacks …

Wormhole attack mitigation strategies and their impact on wireless sensor network performance: A literature survey

H Shahid, H Ashraf, A Ullah, SS Band… - International journal of …, 2022 - Wiley Online Library
Wireless sensor networks (WSNs) consist of hundreds of small sensors that collect and
report data. During data sharing, these WSNs become vulnerable to numerous security …

JamholeHunter: On detecting new wormhole attack in opportunistic mobile networks

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2024 - Elsevier
This paper first shows that Prophet, Spray and Wait, Epidemic, and First Contact routing
protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In …

Enhancing reliability in mobile ad hoc networks (MANETs) through the K-AOMDV routing protocol to mitigate black hole attacks

S Kaushik, K Tripathi, R Gupta, P Mahajan - SN Computer Science, 2024 - Springer
Abstract A Mobile Ad Hoc Network (MANET) is a self-organize assemblage of mobile nodes
without the use of pre-existing infrastructure. They face challenges of security, routing …

Machine learning solutions for mobile internet of things security: A literature review and research agenda

H Messabih, CA Kerrache… - Transactions on …, 2024 - Wiley Online Library
In recent years, the advancements in wireless technologies and sensor networks have
promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique …

Detection and isolation of wormhole nodes in wireless ad hoc networks based on post-wormhole actions

DS Bhatti, S Saleem, A Imran, HJ Kim, KI Kim… - Scientific Reports, 2024 - nature.com
The wormhole attack is one of the most treacherous attacks projected at the routing layer
that can bypass cryptographic measures and derail the entire communication network. It is …

FSSAM: A Five Stage Security Analysis Model for Detecting and Preventing Wormhole Attack in Mobile Ad-Hoc Networks Using Adaptive Atom Search Algorithm

D Hemanand, NS Ram, DS Jayalakshmi - Wireless Personal …, 2023 - Springer
Abstract Mobile Ad-hoc Network is a decentralized wireless network which is drastically
growing day by day. It can be vulnerable to several threats and attacks, namely wormhole …