Detection and removal of node isolation attack in OLSR protocol using imaginary nodes with neighbour response in MANET

KS Gaikwad, SB Waykar - 2017 International conference on …, 2017 - ieeexplore.ieee.org
MANE T is an open wireless, infrastructure less and topology less network environment in
which nodes are free to move anywhere in the network. Various types of protocols are used …

Detection and Prevention of Blackhole node

F Taranum, A Sarvat, N Ali… - 2020 4th International …, 2020 - ieeexplore.ieee.org
Mobile Adhoc networks (MANETs) comprises of mobile devices or nodes that are connected
wirelessly and have no infrastructure. Detecting malicious activities in MANETs is a …

Quality of service-aware security framework for mobile ad hoc networks using optimized link state routing protocol

T Phakathi, F Lugayizi, M Esiefarienrhe - arXiv preprint arXiv:2010.01852, 2020 - arxiv.org
All networks must provide an acceptable and desirable level of Quality of Service (QoS) to
ensure that applications are well supported. This becomes a challenge when it comes to …

[PDF][PDF] Performance evaluation of blackhole attack on vanet's routing protocols

EF Ahmed, RA Abouhogail… - International Journal of …, 2014 - researchgate.net
Abstract Vehicular Ad-hoc Network systems (VANETs) are a dynamic wireless network
where the nodes move randomly without any infrastructure. VANETs are an open …

03. The New Era of Metrology and Its Role in Information Technology: A Survey

A Hogail, R Abdellatif - Journal of Measurement Science and …, 2024 - jmsa.journals.ekb.eg
Since the second half of the 20th century, in practically every sector of the economy,
Information Technology (IT) has been a significant agent of change. National Metrology …

Jellyfish reorder attack on hybrid protocol in manet dissection on variegated parameters

PS Tiwana, N Mann - 2016 Fourth International Conference on …, 2016 - ieeexplore.ieee.org
MANET's have gotten the excitement of examiners in years back. It is a wireless network with
the goal that nodes move subjectively in the system. Zone routing protocol is a kind of …

[PDF][PDF] Performance Analysis of Jellyfish Reorder Attack on Zone routing protocol in MANET

PS Tiwana, N Mann - no. June, 2016 - researchgate.net
MANET's have picked up enthusiasm of analysts in years ago. It is wireless network so that
nodes move arbitrarily in the network. Zone routing protocol is kind of hybrid routing …

[PDF][PDF] Performance Evaluation of the Techniques to Mitigate Blackhole Attack in VANETs

L Kumar, PK Dahiya - Performance Evaluation, 2015 - Citeseer
ABSTRACT Vehicular Adhoc Network (VANET), an integrated part of Intelligent
Transportation System (ITS), is a real-life illustration of a self-organized Adhoc network for …

Penerapan Metode Anomaly Based Detection untuk Mendeteksi Serangan Black hole pada Topologi Mesh di LoRa

A Apriyanti, V Suryani… - eProceedings …, 2020 - … .telkomuniversity.ac.id
LoRa adalah sistem telekomunikasi nirkabel jarak jauh, dan berdaya rendah. LoRa masih
rentan terhadap bentuk serangan yang dapat merusak rute pengiriman data, serta dapat …

[PDF][PDF] Study the impact of different attacks on Zone routing protocol in MANET

PS Tiwana, N Mann, G Kaur - researchgate.net
MANETs are the rising innovation nowadays. ZRP (zone routing protocol) is one of the
hybrid routing protocol. From the security angle each convention should be more secure for …