Co-operation enforcing reputation-based detection techniques and frameworks for handling selfish node behaviour in MANETs: A review

J Sengathir, R Manoharan - Wireless Personal Communications, 2017 - Springer
Abstract In Mobile Ad hoc Network, co-operation between mobile nodes is inevitable for
enabling reliable network connectivity due to the absence of pre-deployed infrastructure. In …

Systematic review for network survivability analysis in MANETS

AH Azni, R Ahmad, ZAM Noh, F Hazwani… - Procedia-Social and …, 2015 - Elsevier
Network survivability analysis in MANETs was hardly an issue in the early years of wireless
technology because there were no critical network system that depended on wireless …

A hybrid deep learning-based (HYDRA) framework for multifault diagnosis using sparse MDT reports

MS Riaz, HN Qureshi, U Masood, A Rizwan… - IEEE …, 2022 - ieeexplore.ieee.org
Diminishing viability of manual fault diagnosis in the increasingly complex emerging cellular
network has motivated research towards artificial intelligence (AI)-based fault diagnosis …

Propagation model of smartphone worms based on semi-Markov process and social relationship graph

S Peng, M Wu, G Wang, S Yu - Computers & security, 2014 - Elsevier
Smartphone applications are getting more and more popular and pervasive in our daily life,
and are also attractive to malware writers due to their limited computing source and …

A hyper-exponential factor-based Semi-Markov prediction mechanism for selfish rendezvous nodes in MANETs

S Janakiraman, BB Jayasingh - Wireless Personal Communications, 2019 - Springer
In multi-hop wireless network like mobile ad hoc network (MANET), co-operation between
mobile nodes under group communication is inevitable for ensuring reliable network …

A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs

J Sengathir, R Manoharan - EURASIP Journal on Wireless …, 2015 - Springer
In mobile ad hoc networks (MANETs), network survivability is considered as a potential
factor required for maintaining maximum degree of connectivity among the mobile nodes …

Mitigating wormhole attack in MANET using absolute deviation statistical approach

S Majumder, D Bhattacharyya - 2018 IEEE 8th Annual …, 2018 - ieeexplore.ieee.org
MANET is vulnerable to so many attacks like Black hole, Wormhole, Jellyfish, Dos etc.
Attackers can easily launch Wormhole attack by faking a route from original within network …

[HTML][HTML] Survivability evaluation for networks carrying complex traffic flows

A Jamali, M Berenjkoub, H Saidi… - Digital Communications …, 2023 - Elsevier
The capability of a system to fulfill its mission promptly in the presence of attacks, failures, or
accidents is one of the qualitative definitions of survivability. In this paper, we propose a …

[PDF][PDF] A review of security challenges in ad-hoc network

RR Chandan, PK Mishra - International Journal of Applied …, 2018 - researchgate.net
Abstract Mobile Ad-Hoc Network is an infrastructure less wireless network consists of mobile
nodes. MANET has been a great research topic because of various challenges associated …

Effective proactive and reactive defense strategies against malicious attacks in a virtualized honeynet

FYS Lin, YS Wang, MY Huang - Journal of Applied …, 2013 - Wiley Online Library
Virtualization plays an important role in the recent trend of cloud computing. It allows the
administrator to manage and allocate hardware resources flexibly. However, it also causes …