A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs

N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …

Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation

N Khanna, M Sachdeva - International Journal of …, 2019 - Wiley Online Library
Security against routing attacks in MANET is most critical issue and traditional concepts of
cryptography, authentication, or Watchdog are not that significant in mitigation of these …

EAODV: Detection and removal of multiple black hole attacks through sending forged packets in MANETs

T Delkesh, MA Jabraeil Jamali - Journal of Ambient Intelligence and …, 2019 - Springer
Detecting and removing black hole attacks are considered to be one major routing security
issue in mobile ad hoc networks (MANETs). Malicious nodes existing on the delivery route of …

A novel light-weight subjective trust inference framework in MANETs

H Xia, Z Li, Y Zheng, A Liu, YJ Choi… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
There is an inherent reliance on collaboration among the participants of mobile ad hoc
networks in order to achieve the fixed functionalities. However, they are susceptible to the …

Light-weight trust-enhanced on-demand multi-path routing in mobile ad hoc networks

H Xia, J Yu, C Tian, Z Pan, E Sha - Journal of Network and Computer …, 2016 - Elsevier
Mobile ad hoc networks (MANETs) are originally designed for a cooperative environment,
which are vulnerable to a wide variety of attacks due to their intrinsic characteristics. Trust …

Applying trust enhancements to reactive routing protocols in mobile ad hoc networks

H Xia, J Yu, Z Pan, X Cheng, EHM Sha - Wireless Networks, 2016 - Springer
Due to the characteristics of mobile ad hoc networks, such networks are more susceptible to
the destruction of malicious attacks or denial of cooperation. It would be easy for an …

A fuzzy trust-based routing model for mitigating the misbehaving nodes in mobile ad hoc networks

A Beghriche, A Bilami - International Journal of Intelligent Computing …, 2018 - emerald.com
Purpose Security is one of the major challenges in the design and implementation of
protocols for mobile ad hoc networks (MANETs). In such systems, the cooperation between …

Trust-Based DSR Protocol for Secure Communication in Mobile Ad-hoc Networks

P Ranjan, R Ranjan - Advances in Data-driven Computing and Intelligent …, 2023 - Springer
Identification of a malicious node in the ad-hoc network is a very challenging issue due to
some limitations, such as no base station or centralized server, dynamic topology, low …

BEST: Battery, Efficiency and Stability based trust mechanism using enhanced AODV for mitigation of Blackhole attack and its variants in MANETs.

N Khanna, M Sachdeva - Adhoc & Sensor Wireless …, 2020 - search.ebscohost.com
This paper attempts to resolve the issue of mitigation of blackhole attack and its variants by
presenting a battery, efficiency and stability based trust mechanism that performs both …

An approach for determining trustworthiness of individuals in a web-based social network

S Singh, J Sidhu - Arabian Journal for Science and Engineering, 2016 - Springer
The role of Web-based social networks is increasing in our personal as well as professional
life. We come across persons of varied natures, personalities, attitudes, beliefs, feelings, etc …