Deep embedded median clustering for routing misbehaviour and attacks detection in ad-hoc networks

A Rajendran, N Balakrishnan, P Ajay - Ad Hoc Networks, 2022 - Elsevier
Due to the properties of ad-hoc networks, it appears that designing sophisticated defence
schemes with more computing capital is impossible in most situations. Recently, an …

Enhancing reliability in mobile ad hoc networks (MANETs) through the K-AOMDV routing protocol to mitigate black hole attacks

S Kaushik, K Tripathi, R Gupta, P Mahajan - SN Computer Science, 2024 - Springer
Abstract A Mobile Ad Hoc Network (MANET) is a self-organize assemblage of mobile nodes
without the use of pre-existing infrastructure. They face challenges of security, routing …

[PDF][PDF] Efficient detection and mitigation of rushing attacks in VANET using RAID: a novel intrusion detection system

VK Kapu, GR Karri - J Comput Sci, 2023 - researchgate.net
The vehicle manufacturing hub has evolved over the last decade with the emergence of self-
driving vehicles and human-driven vehicles that use the concept of Artificial Intelligence (AI) …

Design of a novel micro‐Zone adaptive Energy‐Trust evaluation Active On‐Demand Vector protocol to optimize communication in challenging and attacked mobile …

K Juneja - International Journal of Communication Systems, 2022 - Wiley Online Library
High congestion, mobility, and energy restrictions are the critical challenges to mobile
networks. The conventional routing protocols are unable to ensure effective and reliable …

A scalable secure routing protocol for managed-open mobile ad-hoc networks

L Qabajeh - 2022 - scholar.ppu.edu
Mobile Ad-hoc networks are getting progressively more popular. In such networks, nodes
are continuously moving, hence, seeking an efficient route from a particular source to …

Mitigation of smart black hole attacks using universal sink detection method in graph theory

K MEKKAOUI, H TEGGAR - 2023 - researchsquare.com
Nowadays, network security has become a very important aspect due to the increasing
number of connected things and the multiple threats that become more and more intelligent …

Secure EELB-AOMDV Protocol to Mitigate Blackhole Attack

BS Rani, K Shyamala - 2023 9th International Conference on …, 2023 - ieeexplore.ieee.org
Recent advancements in wireless technologies have gradually increased the application
domain of Wireless Sensor Networks (WSNs) in hostile and unsupervised environments …

Original Research Article Performance optimization of multipath K-AOMDV protocol using SVM against blackhole attack

S Kaushik, K Tripathi, R Gupta… - Journal of Autonomous …, 2024 - jai.front-sci.com
This research focuses on the Ad Hoc On-Demand Multi-Path Routing (AOMDV) protocol,
which is preferred for its improved efficiency compared to a single-path routing protocol in …

Enhancing Security in Mobile Ad Hoc Networks: Detection and Isolation of Smart Black Hole Attacks using Universal Sink Detection Technique in Graph Theory

K MEKKAOUI, H TEGGAR, A Houacine - 2023 - researchsquare.com
Network security is of utmost importance due to the ever-increasing number of connected
devices and the growing sophistication of threats. Mobile Ad hoc networks (MANETs) …

Sécurité du routage dans les protocoles de routage multichemins

A TAMI - 2021 - pnst.cerist.dz
Résumé La thèse se focalise sur la sécurité dans les réseaux mobiles ad hoc (MANET).
L'absence d'une gestion centrale des fonctionnalités du réseau rend ces réseaux beaucoup …