Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey

Z Movahedi, Z Hosseini, F Bayan… - … Surveys & Tutorials, 2015 - ieeexplore.ieee.org
Trust management is a promising approach to conduct nodes' transactions and establish
management interactions in distributed mobile ad hoc networks (MANETs) in which nodes' …

Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

[HTML][HTML] Social engineering attacks and countermeasures in the new zealand banking system: Advancing a user-reflective mitigation model

D Airehrour, N Vasudevan Nair, S Madanian - Information, 2018 - mdpi.com
Social engineering attacks are possibly one of the most dangerous forms of security and
privacy attacks since they are technically oriented to psychological manipulation and have …

Survey of routing attacks and countermeasures in mobile ad hoc networks

AA Korba, M Nafaa, G Salim - 2013 UKSim 15th International …, 2013 - ieeexplore.ieee.org
Mobile Ad-hoc Mobile ad hoc networks (MANET) are collections of self-organizing mobile
nodes with dynamic topologies and have no fixed infrastructure. Because of their dynamic …

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

S Sen, JA Clark - Computer Networks, 2011 - Elsevier
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their
dynamic nature, the lack of central points, and their highly resource-constrained nodes. In …

Secure routing protocol design for UAV ad hoc networks

JA Maxa, MSB Mahmoud… - 2015 IEEE/AIAA 34th …, 2015 - ieeexplore.ieee.org
UAV Ad hoc NETworks (UAANETs) can be defined as a new form of ad hoc networks in
which nodes are Unmanned Aerial Vehicles (UAVs) and Ground Control Station (GCS) …

A study review on gray and black hole in mobile Ad Hoc networks (MANETs)

MM Hamdi, AF Flaih, ML Jameel… - … Congress on Human …, 2022 - ieeexplore.ieee.org
Unlike other types of networks, a MANET is self-configuring and does not need centralized
management. Anywhere and at any moment, a MANET may be established. Mobile ad hoc …

A survey of security in uavs and fanets: Issues, threats, analysis of attacks, and solutions

O Ceviz, P Sadioglu, S Sen - arXiv preprint arXiv:2306.14281, 2023 - arxiv.org
Thanks to the rapidly developing technology, unmanned aerial vehicles (UAVs) are able to
complete a number of tasks in cooperation with each other without need for human …

A novel review on security and routing protocols in MANET

M Kashif Nazir, RU Rehman… - Communications and …, 2016 - eprint.subtopublish.com
The origin of Mobile ad hoc network (MANET) was started in 1970 as packet radio network
(PRNET), later on different researches were made on it in different ages. MANET works …

[PDF][PDF] A secure wireless communication protocol using Diffie-Hellman key exchange

A Chaturvedi, N Srivastava, V Shukla - International journal of computer …, 2015 - Citeseer
ABSTRACT In 1976, Diffie and Hellman in their path breaking paper [5] proposed a two
party key agreement protocol based on finite field. Diffie–Hellman Key Exchange Protocol …