Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network
Wireless technology and the latest developments in a mobile object, has led to a Mobile Ad
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
Hoc network (MANET), which is a collection of mobile nodes that are communicating with …
A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …
working and vulnerability of underlined standard routing protocols is exposed to various …
Black hole attack detection using K‐nearest neighbor algorithm and reputation calculation in mobile ad hoc networks
G Farahani - Security and communication Networks, 2021 - Wiley Online Library
The characteristics of the mobile ad hoc network (MANET), such as no need for
infrastructure, high speed in setting up the network, and no need for centralized …
infrastructure, high speed in setting up the network, and no need for centralized …
Contradiction based gray-hole attack minimization for ad-hoc networks
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.),
detection & mitigation techniques only function after the attack has commenced. Prevention …
detection & mitigation techniques only function after the attack has commenced. Prevention …
Performance analysis of black-hole attack mitigation protocols under gray-hole attacks in MANET
The recent development in wireless communication technology and portable devices has
led to the development of Mobile Ad-Hoc Network which has unique features such as …
led to the development of Mobile Ad-Hoc Network which has unique features such as …
Wormhole attack detection techniques in ad-hoc network: A systematic review
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can
communicate without pre-existing infrastructure. Owning to utilization of open medium …
communicate without pre-existing infrastructure. Owning to utilization of open medium …
An authentication protocol for future sensor networks
M Bilal, SG Kang - Sensors, 2017 - mdpi.com
Authentication is one of the essential security services in Wireless Sensor Networks (WSNs)
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
for ensuring secure data sessions. Sensor node authentication ensures the confidentiality …
A dynamic threshold based approach for mitigating black-hole attack in MANET
Mobile ad-hoc network is an infrastructure less type of network which does not require any
kind of fixed infrastructure. It provides multi-hop communication between the source and …
kind of fixed infrastructure. It provides multi-hop communication between the source and …
Survey of secure routing protocols for wireless ad hoc networks
M Boulaiche - Wireless Personal Communications, 2020 - Springer
The diverse network technologies and low-end wireless technologies have enabled the
deployment of self-organized wireless ad hoc networks. Nodes forming such networks have …
deployment of self-organized wireless ad hoc networks. Nodes forming such networks have …
A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET
Mobile Ad hoc network (MANET) is a wireless network which is characterized by dynamic
network topology, open medium, multi-hop communication etc. in which each device not …
network topology, open medium, multi-hop communication etc. in which each device not …