Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges

S Kumar, K Dutta - Security and Communication Networks, 2016 - Wiley Online Library
Abstract In recent years, Mobile Ad hoc NETworks (MANETs) have generated great interest
among researchers in the development of theoretical and practical concepts, and their …

Analyzing, quantifying, and detecting the blackhole attack in infrastructure-less networks

C Panos, C Ntantogian, S Malliaros, C Xenakis - Computer Networks, 2017 - Elsevier
The blackhole attack is one of the simplest yet effective attacks that target the AODV
protocol. Blackhole attackers exploit AODV parameters in order to win route requests, and …

A novel approach for mitigating route request flooding attack in MANET

S Gurung, S Chauhan - Wireless Networks, 2018 - Springer
Mobile ad-hoc network (MANET) is a temporary network in which the main requirement for
establishing the communication path among nodes is that the nodes should be cooperative …

RETINA: Distributed and secure trust management for smart grid applications and energy trading

V Bolgouras, T Ioannidis, I Politis, A Zarras… - … Energy, Grids and …, 2024 - Elsevier
The rapid adoption of smart grids demands robust security and efficiency measures due to
their critical role in delivering electricity and their potential for customer-oriented benefits …

Polymorphic adversarial cyberattacks using WGAN

R Chauhan, U Sabeel, A Izaddoost… - Journal of Cybersecurity …, 2021 - mdpi.com
Intrusion Detection Systems (IDS) are essential components in preventing malicious traffic
from penetrating networks and systems. Recently, these systems have been enhancing their …

CUREX: seCUre and pRivate hEalth data eXchange

F Mohammadi, A Panou, C Ntantogian… - IEEE/WIC/ACM …, 2019 - dl.acm.org
The Health sector's increasing dependence on digital information and communication
infrastructures renders it vulnerable to privacy and cybersecurity threats, especially as the …

Distributed key management in microgrids

V Bolgouras, C Ntantogian… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Security for smart industrial systems is prominent due to the proliferation of cyber threats
threatening national critical infrastructures. Smart grid comes with intelligent applications …

A security evaluation of FIDO's UAF protocol in mobile and embedded devices

C Panos, S Malliaros, C Ntantogian, A Panou… - … . Towards a Smart and …, 2017 - Springer
Abstract The FIDO (Fast Identity Online) Universal Authentication Framework is a new
authentication mechanism that replaces passwords, simplifying the process of user …

An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET

AO Alkhamisi, SM Buhari… - … Journal of Grid and …, 2020 - inderscienceonline.com
A Mobile Ad hoc Network (MANET) can work well only when the mobile nodes behave
cooperatively in packet routing. To reduce the hazards from malicious nodes and enhance …

Automatic deployment of specification-based intrusion detection in the BACnet protocol

H Esquivel-Vargas, M Caselli, A Peter - … of the 2017 workshop on cyber …, 2017 - dl.acm.org
Specification-based intrusion detection (SB-ID) is a suitable approach to monitor Building
Automation Systems (BASs) because the correct and non-compromised functioning of the …