Secure opportunistic watchdog production in wireless sensor networks: a review

S Rajasoundaran, AV Prabu, GS Kumar… - Wireless Personal …, 2021 - Springer
Finding the security vulnerabilities and solving the issues in Wireless Sensor Networks
(WSN) are mandatory tasks for providing secure data transmission. Attackers or intruders …

Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning

Z Wei, H Tang, FR Yu, M Wang… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology
and open wireless medium, may lead to MANETs suffering from many security …

[KNYGA][B] Security for wireless ad hoc networks

F Anjum, P Mouchtaris - 2007 - books.google.com
This book addresses the problems and brings solutions to the security issues of ad-hoc
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …

Contradiction based gray-hole attack minimization for ad-hoc networks

N Schweitzer, A Stulman, RD Margalit… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Although quite popular for the protection for ad-hoc networks (MANETs, IoT, VANETs, etc.),
detection & mitigation techniques only function after the attack has commenced. Prevention …

[PDF][PDF] Attacks against OLSR: Distributed key management for security

C Adjih, D Raffo, P Muhlethaler - 2nd OLSR Interop/Workshop …, 2005 - researchgate.net
In Mobile Ad Hoc Networks (MANETs), mobile nodes use wireless devices to create
spontaneously a larger network, larger than radio range, in which communication with each …

An advanced signature system for OLSR

D Raffo, C Adjih, T Clausen, P Mühlethaler - … on Security of ad hoc and …, 2004 - dl.acm.org
In this paper we investigate security issues related to the Optimized Link State Routing
Protocol--one example of a proactive routing protocol for MANETs. We inventory the …

Trust-based security for the OLSR routing protocol

A Adnane, C Bidan, RT de Sousa Júnior - Computer Communications, 2013 - Elsevier
The trust is always present implicitly in the protocols based on cooperation, in particular,
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …

A novel optimally weighted framework of piecewise gamma corrected fractional order masking for satellite image enhancement

H Singh, A Kumar, LK Balyan, GK Singh - Computers & Electrical …, 2019 - Elsevier
A novel image quality enhancement framework is proposed here through a collective
inspiration of the exponential, differential and linear operational behavior of pixel intensities …

Mitigating denial of service attacks in OLSR protocol using fictitious nodes

N Schweitzer, A Stulman, A Shabtai… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET)
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …

An efficient routing protocol in mobile ad-hoc networks by using artificial immune system

F Sarkohaki, R Fotohi, V Ashrafian - arxiv preprint arxiv:2003.00869, 2020 - arxiv.org
Characteristics of the mobile ad-hoc networks such as nodes high mobility and limited
energy are regarded as the routing challenges in these networks. OLSR protocol is one of …