Fuzzy based intrusion detection systems in MANET

EV Balan, MK Priyan, C Gokulnath, GU Devi - Procedia Computer Science, 2015 - Elsevier
Mobile adhoc network (MANET) is an infrastructure less wireless network and self-
organized. During communication mobile adhoc network do not use any proper …

Assessment and analysis of action degeneracy due to blackhole attacks in wireless sensor networks

T Saravanan, P Sasikumar - … of 6th international conference on recent …, 2021 - Springer
Wireless sensor systems (WSN) have turned into a develo** zone of innovative work
because of the huge number of uses that can significantly profit by such frameworks and has …

Review of Machine Learning-Based Intrusion Detection Techniques for MANETs

F Hamza, S Maria Celestin Vigila - Computing and Network Sustainability …, 2019 - Springer
Mobile ad hoc network is a widely develo** technology that has been used in various
areas such as in health care, military, virtual classrooms and conferences. However, mobile …

[PDF][PDF] SVM based approach for intrusion detection in manet

GK Wadhwani, SK Khatri… - Revitas …, 2020 - rev-inv-ope.pantheonsorbonne.fr
ABSTRACT A mobile ad-hoc network (MANET) is a collection of mobile devices having
routing capabilities to reach to the destination. Cooperation of all the nodes in the network is …

Configurable secured adaptive routing protocol for mobile wireless sensor networks

A Alnaser, H Al-Junaid… - International Journal of …, 2022 - yadda.icm.edu.pl
This paper aims at designing, building, and simulating a secured routing protocol to defend
against packet drop** attacks in mobile WSNs (MWSNs). This research addresses the …

[PDF][PDF] Proposed agent based black hole node detection algorithm for ad-hoc wireless network

N Thakur, D Bisen, N Gupta - International Journal on Computational …, 2015 - academia.edu
A Mobile ad-hoc network (MANET) is a latest and emerging Research topic among
researchers. The reason behind the popularity of MANET is flexibility and independence of …

[PDF][PDF] DESIGN AND EVOLUTION OF MAC ALGORITHM BASED STRATEGY TO MITIGATE BLACK HOLE ATTACKS IN WIRELESS SENSOR NETWORK

S SELVAKUMAR, MM SAISREE… - Journal of Theoretical and …, 2024 - jatit.org
Despite tremendous advances in successful packet transmission in the current context of
technological progress on wireless networks, network security remains an unavoidable …

[PDF][PDF] Review of security approaches in routing protocol in mobile adhoc network

SR Gowda, PS Hiremath - … Journal of Computer Science Issues (IJCSI), 2013 - Citeseer
In this paper the objective is to present a review of routing protocols in mobile ad hoc
network (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often …

[PDF][PDF] An Efficient And Secure Intrusion Detection Method In Mobile Adhoc Network Using Intuitionistic Fuzzy

K Anusha, N Jayaleshwari, S Arun Kumar… - International Journal of …, 2013 - Citeseer
Mobile ad-hoc Network is a self organized wireless network which has a dynamic topology
where nodes can be join or leave the network at anytime with large number of nodes. Due to …

Design and Performance Assessment of a Novel Framework for Detection and Recuperation Against BlackHole Assault in Wireless Networks: MANET

MA Shah, M Sharma, M Singh, HS Bedi - Authorea Preprints, 2022 - essopenarchive.org
Nodes that can both transmit and receive messages are necessary for communication.
Intermediary nodes may be used by nodes that are communicating with each other …