Demystifying in-vehicle intrusion detection systems: A survey of surveys and a meta-taxonomy

G Karopoulos, G Kambourakis, E Chatzoglou… - Electronics, 2022 - mdpi.com
Breaches in the cyberspace due to cyber-physical attacks can harm the physical space, and
any type of vehicle is an alluring target for wrongdoers for an assortment of reasons …

VANET simulators: an updated review

JS Weber, M Neves, T Ferreto - Journal of the Brazilian Computer Society, 2021 - Springer
Research on VANETs (vehicular ad hoc networks) date back to the beginning of the 2000s.
The possibility of enabling communication between vehicles through a wireless network …

A Dynamic Reputation Management System for Mobile Ad Hoc Networks

E Chiejina, H Xiao, B Christianson - Computers, 2015 - mdpi.com
Nodes in mobile ad hoc networks (MANETs) are mandated to utilize their limited energy
resources in forwarding routing control and data packets for other nodes. Since a MANET …

Dynamic selfish node detection with link quality consideration in vehicular networks

A Shan, X Fan, C Wu, X Zhang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
With the emergence of various applications in intelligent transportation systems (ITS), the
cooperative communication among the nodes on roads is becoming more and more …

A Reinforcement Learning Based Incentive Scheme for Multi-Hop Communications in Vehicular Networks

A Shan, X Fan, X Chen, Y Ji… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Vehicular network applications heavily rely on multi-hop communication technologies to
ensure efficient and reliable data transmissions because of the limited wireless transmission …

A nobel defence scheme against selfish node attack in manet

G Soni, K Chandravanshi - arXiv preprint arXiv:1307.3638, 2013 - arxiv.org
Security is one of the major issue in wired and wireless network but due to the presence of
centralized administration not difficult to find out misbehavior in network other than in Mobile …

[PDF][PDF] Identification technique for all passive selfish node attacks in a mobile network

S Mittal, S Dahiya - International Journal, 2015 - researchgate.net
The focus of this work is on detection of passive path selfish node in mobile network. Earlier
techniques for detection were based on statistical or signature. These techniques were …

[PDF][PDF] A Collaborative selfish replica with watchdog and pathrater in MANETS

D Anitha, M Punithavalli - … Journal of Computer Science and Mobile …, 2013 - academia.edu
Mobile Ad-Hoc Networks are autonomous and decentralized wireless systems. MANETs
consist of mobile nodes that are free in moving in and out in the network. Nodes are the …

[PDF][PDF] A System for MANET to detect selfish nodes using NS2

SD Padiya, R Pandit, S Patel - Int. J. Eng. Sci. Innov. Technol, 2012 - researchgate.net
“DEVNAGARI HANDWRITTEN CHARACTER RECOGNITION” Page 1 See discussions, stats,
and author profiles for this publication at: https://www.researchgate.net/publication/259484464 …

[PDF][PDF] Communication based clustering to detect selfish nodes in MANET

DS Kumari, KT Sikamani - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Objective: The main intent of this research is to detect the selfish node in Mobile Ad-hoc
Networks (MANETs) and to select the Cluster Head (CH) based on the energy level and …