Current research on Internet of Things (IoT) security: A survey

WH Hassan - Computer networks, 2019 - Elsevier
The results of IoT failures can be severe, therefore, the study and research in security issues
in the IoT is of extreme significance. The main objective of IoT security is to preserve privacy …

Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network

P Rani, S Verma, GN Nguyen - IEEE access, 2020 - ieeexplore.ieee.org
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …

Machine learning and trust based AODV routing protocol to mitigate flooding and blackhole attacks in MANET

S Shafi, S Mounika, S Velliangiri - Procedia Computer Science, 2023 - Elsevier
The latest advancements in wireless communication promotes the researchers to
concentrate more in the expansion of Mobile Ad hoc Networks (MANETs), where nodes …

Adaptive and channel-aware detection of selective forwarding attacks in wireless sensor networks

J Ren, Y Zhang, K Zhang, X Shen - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) are vulnerable to selective forwarding attacks that can
maliciously drop a subset of forwarding packets to degrade network performance and …

Robust and secure data transmission using artificial intelligence techniques in ad-hoc networks

P Rani, Kavita, S Verma, N Kaur, M Wozniak, J Shafi… - Sensors, 2021 - mdpi.com
The paper presents a new security aspect for a Mobile Ad-Hoc Network (MANET)-based IoT
model using the concept of artificial intelligence. The Black Hole Attack (BHA) is considered …

Controversy-adjudication-based trust management mechanism in the internet of underwater things

J Jiang, S Hua, G Han, A Li, C Lin - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Owing to the characteristics of underwater communication, such as limited bandwidth, low
transmission speed, and long delivery delay, it is significantly challenging to address trust …

[HTML][HTML] Counteracting selfish nodes using reputation based system in mobile ad hoc networks

M Fayaz, G Mehmood, A Khan, S Abbas, M Fayaz… - Electronics, 2022 - mdpi.com
A mobile ad hoc network (MANET) is a group of nodes constituting a network of mobile
nodes without predefined and pre-established architecture where mobile nodes can …

Toward energy-efficient and trustworthy eHealth monitoring system

A Sawand, S Djahel, Z Zhang… - China …, 2015 - ieeexplore.ieee.org
The rapid technological convergence between Internet of Things (IoT), Wireless Body Area
Networks (WBANs) and cloud computing has made e-healthcare emerge as a promising …

Trust management for secure cognitive radio vehicular ad hoc networks

Y He, FR Yu, Z Wei, V Leung - Ad Hoc Networks, 2019 - Elsevier
Recently, there are growing interests in cognitive radio vehicular ad hoc networks (CR-
VANETs), which is a kind of intelligent cyber-physical systems. In CR-VANETs, there are two …