An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET

R Chakravorty, J Prakash, A Srivastava - Soft Computing, 2024 - Springer
Today, more than ever, the necessity for remote availability, independent of a client's
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …

Crossover Boosted Grey Wolf Optimizer‐based framework for leader election and resource allocation in Intrusion Detection Systems for MANETs

S Selvaraj, M Nanjappan… - Transactions on …, 2024 - Wiley Online Library
Abstract Mobile Ad hoc Networks (MANETs) is a self‐organizing networks without having a
fixed infrastructure for making them susceptible to security threats. Intrusion Detection …

ABGF-AODV protocol to prevent black-hole, gray-hole and flooding attacks in MANET

S Gurung, V Mankotia - Telecommunication Systems, 2024 - Springer
Wireless ad hoc networks play a pivotal role in wireless communication systems. MANETs
find extensive applications across various domains, encompassing real-time information …

DTAM: A Dynamic Threshold and Monitoring Based Technique to Protect Mobile Ad-hoc Network from Black-Hole and Flooding Attacks

V Mankotia, RK Sunkaria, S Gurung - Wireless Personal Communications, 2024 - Springer
Abstract Mobile Ad-hoc Network (MANET) is an emerging and prevalent technology in
wireless networks that consists of autonomous mobile nodes. These movable nodes can …

An optimized crypto‐based routing protocol for secure routing in wireless sensor networks

KUR Khan, MA Azeem - Concurrency and Computation …, 2024 - Wiley Online Library
Summary In Wireless Sensor Networks (WSN), energy‐efficient, reliable routing is the core
objective for the data transmission process. Anomaly nodes in the communication …

Design of intrusion detection and prevention model using COOT optimization and hybrid LSTM-KNN classifier for MANET

G Madhu - EAI Endorsed Transactions on Scalable Information …, 2022 - eudl.eu
INTRODUCTION: MANET is an emerging technology that has gained traction in a variety of
applications due to its ability to analyze large amounts of data in a short period of time. Thus …

Design of a novel micro‐Zone adaptive Energy‐Trust evaluation Active On‐Demand Vector protocol to optimize communication in challenging and attacked mobile …

K Juneja - International Journal of Communication Systems, 2022 - Wiley Online Library
High congestion, mobility, and energy restrictions are the critical challenges to mobile
networks. The conventional routing protocols are unable to ensure effective and reliable …

Detecting black hole attacks in MANET using baiting and timer technique with AODV protocol

F El Haoussi, N El Fezazi, S Idrissi… - … on Optimization and …, 2023 - ieeexplore.ieee.org
MANET (Mobile Ad hoc Network) is sensitive to attacks due to the lack of infrastructure and
central control that influences on the adaptation of the security solutions of this network. The …

A Novel Approach for Intrusion Detection System Using Equalized Multi-Routing Protocol in MANET

JJ Jayakanth, GL Madhumati, L Dhanesh… - International Journal of …, 2023 - ijisae.org
In recent years, a Mobile Ad Hoc Network (MANET) has emerged as a Wireless
Communication Network (WCN) consisting of several highly mobile nodes moving in various …

Application of PSO-FCM Intelligent Algorithm in Computer Network Data Detection

J Zhou - … on Cognitive based Information Processing and …, 2022 - Springer
With the rapid development of the Internet, the era of information intelligence has increased
the opportunities for malicious personnel to leak data and conduct network attacks, and …