A comprehensive taxonomy of schemes to detect and mitigate blackhole attack and its variants in MANETs
N Khanna, M Sachdeva - Computer Science Review, 2019 - Elsevier
Abstract Mobile Ad hoc Network due to its intrinsic properties of mobility, infrastructure-less
working and vulnerability of underlined standard routing protocols is exposed to various …
working and vulnerability of underlined standard routing protocols is exposed to various …
Study of trust‐based mechanism and its component model in MANET: Current research state, issues, and future recommendation
N Khanna, M Sachdeva - International Journal of …, 2019 - Wiley Online Library
Security against routing attacks in MANET is most critical issue and traditional concepts of
cryptography, authentication, or Watchdog are not that significant in mitigation of these …
cryptography, authentication, or Watchdog are not that significant in mitigation of these …
Robust defense scheme against selective drop attack in wireless ad hoc networks
Performance and security are two critical functions of wireless ad-hoc networks (WANETs).
Network security ensures the integrity, availability, and performance of WANETs. It helps to …
Network security ensures the integrity, availability, and performance of WANETs. It helps to …
Locating a black hole in a dynamic ring
In networked environments supporting mobile agents, a pressing problem is the presence of
network sites harmful for the agents. In this paper we consider the danger posed by a node …
network sites harmful for the agents. In this paper we consider the danger posed by a node …
Dangerous graphs
Anomalies and faults are inevitable in computer networks, today more than ever before. This
is due to the large scale and dynamic nature of the networks used to process big data and to …
is due to the large scale and dynamic nature of the networks used to process big data and to …
Asynchronous Gathering in a Dangerous Ring
Consider a set of k identical asynchronous mobile agents located in an anonymous ring of n
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …
nodes. The classical Gather (or Rendezvous) problem requires all agents to meet at the …
BEST: Battery, Efficiency and Stability based trust mechanism using enhanced AODV for mitigation of Blackhole attack and its variants in MANETs.
N Khanna, M Sachdeva - Adhoc & Sensor Wireless …, 2020 - search.ebscohost.com
This paper attempts to resolve the issue of mitigation of blackhole attack and its variants by
presenting a battery, efficiency and stability based trust mechanism that performs both …
presenting a battery, efficiency and stability based trust mechanism that performs both …
Fast bandwidth-delay routing methods for software-defined network (SDN)
Multi-objective optimization methods for routing in SDN networks have come in existence in
which QOS measurements is a challenging one. In order to improve the quality of service …
which QOS measurements is a challenging one. In order to improve the quality of service …
Perpetual Exploration of a Ring in Presence of Byzantine Black Hole
Perpetual exploration is a fundamental problem in the domain of mobile agents, where an
agent needs to visit each node infinitely often. This issue has received lot of attention, mainly …
agent needs to visit each node infinitely often. This issue has received lot of attention, mainly …
[HTML][HTML] More agents may decrease global work: A case in butterfly decontamination
F Luccio, L Pagli - Theoretical Computer Science, 2016 - Elsevier
This paper is a contribution to network decontamination with a view inherited from parallel
processing. At the beginning some or all the vertices may be contaminated. The network is …
processing. At the beginning some or all the vertices may be contaminated. The network is …