Wormhole attack detection techniques in ad-hoc network: A systematic review

C Gupta, L Singh, R Tiwari - Open Computer Science, 2022 - degruyter.com
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …

SecurePrivChain: A decentralized framework for securing the global model using cryptography

K Sanam, SUR Malik, T Kanwal, ZUI Adil - Future Generation Computer …, 2023 - Elsevier
Abstract VANETS (IoVs), banks, and healthcare records are the sensitive information of
vehicles, clients, and patients that is stored and maintained electronically, which has …

Efficient approaches to mitigate the effect of Sybil attack in manet for high network lifetime: A review

R Kumari, M Dutta - 2018 Fifth International Conference on …, 2018 - ieeexplore.ieee.org
MANET is known as a self configuring, dynamic infrastructure to connect mobile devices
through wireless. There are several challenges which affect the MANET, such as routing …

Exploiting Selfishness, Altruism and Common Welfare to Enhance Performance of Routing Protocols for Mobile Ad hoc Networks

DG Kampitaki, AA Economides - Wireless Personal Communications, 2018 - Springer
Abstract Mobile Ad hoc Networks are sensitive to selfish behavior that may occur due to
restricted power or other resources. Several approaches have been investigated so far to …

ANMS: DESIGN AND EVALUATION OF A MANET SIMULATOR FOR DIVERSIFIED ATTACKS

H Salama, G Salama, K Badran… - Journal of Al-Azhar …, 2018 - journals.ekb.eg
In this paper as-Application Needs MANET Simulator (ANMS) is presented as a novel
unique simulator that can simulate equally the two attack types. The underlying simulator …

[引用][C] Strong security scheme for single node and colluding nodes byzantine Attacks in MANETS

R Sivakami, SC Raghava - Annals of the Romanian Society for Cell Biology, 2021