Classical and bio-inspired mobility in sensor networks for IoT applications

R Hamidouche, Z Aliouat, AM Gueroui, AAA Ari… - Journal of Network and …, 2018‏ - Elsevier
With the emergence of Internet of Things (IoT) technology, a huge number of sensor based
applications are going to be deployed. Thus, due to their valuable contribution, these …

Intelligent optimization of wireless sensor networks through bio-inspired computing: survey and future directions

S Jabbar, R Iram, AA Minhas, I Shafi… - International …, 2013‏ - journals.sagepub.com
This survey article is a comprehensive discussion on Intelligent Optimization of Wireless
Sensor Networks through Bio-Inspired Computing. The marvelous perfection of biological …

A survey of ant colony optimization based routing protocols for mobile ad hoc networks

H Zhang, X Wang, P Memarmoshrefi, D Hogrefe - IEEE access, 2017‏ - ieeexplore.ieee.org
Develo** highly efficient routing protocols for Mobile Ad hoc NETworks (MANETs) is a
challenging task. In order to fulfill multiple routing requirements, such as low packet delay …

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

S Sen, JA Clark - Computer Networks, 2011‏ - Elsevier
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their
dynamic nature, the lack of central points, and their highly resource-constrained nodes. In …

Quality-of-service-enabled ant colony-based multipath routing for mobile ad hoc networks

P Venkata Krishna, V Saritha, G Vedha, A Bhiwal… - IET communications, 2012‏ - IET
Mobile ad hoc networks (MANETs) are dynamically changing and self-configuring networks.
Owing to their widespread use for many applications, multipath routing in MANETs has been …

[PDF][PDF] A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-hoc Network

P Sharma, N Sharma, R Singh - International Journal of Computer …, 2012‏ - academia.edu
Wireless Mobile ad-hoc network (MANET) is an emerging technology and have great
strength to be applied in critical situations like battlefields and commercial applications such …

Enhanced intrusion detection system for malicious node detection in ad hoc routing protocols using minimal energy consumption

S Umang, BVR Reddy, MN Hoda - IET communications, 2010‏ - IET
An ad hoc network is the assortment of cooperative wireless nodes without existence of any
access point or infrastructure. Many ad hoc network routing protocols have been proposed …

Ddos attack and defense scheme in wireless ad hoc networks

SA Arunmozhi, Y Venkataramani - arxiv preprint arxiv:1106.1287, 2011‏ - arxiv.org
The wireless ad hoc networks are highly vulnerable to distributed denial of service (DDoS)
attacks because of its unique characteristics such as open network architecture, shared …

Hybrid IDS using SVM classifier for detecting DoS attack in MANET application

V Justin, N Marathe, N Dongre - … Conference on I-SMAC (IoT in …, 2017‏ - ieeexplore.ieee.org
Mobile ad hoc networks have become a very popular research topic. By providing
communications in the absence of a fixed infrastructure MANETs are becoming vulnerable …

ACO-based secure routing protocols in MANETs

N Panda, BK Pattanayak - New Paradigm in decision science and …, 2020‏ - Springer
Applications of mobile ad hoc networks (MANETs) have gained increasing popularity among
different areas of human life and significantly attracted the attention of the researchers in this …