A survey on security attacks in VANETs: Communication, applications and challenges

M Arif, G Wang, MZA Bhuiyan, T Wang… - Vehicular Communications, 2019 - Elsevier
Over the past few decades, the intelligent transportation system (ITS) have emerged with
new technologies and becomes the data-driven ITS, because the substantial amount of data …

A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV

F Sakiz, S Sen - Ad Hoc Networks, 2017 - Elsevier
Vehicular ad hoc networks (VANETs) have become one of the most promising and fastest
growing subsets of mobile ad hoc networks (MANETs). They are comprised of smart …

Security threats and solutions in MANETs: A case study using AODV and SAODV

J Von Mulert, I Welch, WKG Seah - Journal of network and computer …, 2012 - Elsevier
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts.
Driven by the unique and considerable difficulties of providing security arising from the …

A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments

AS Sohal, R Sandhu, SK Sood, V Chang - Computers & Security, 2018 - Elsevier
Device security is one of the major challenges for successful implementation of Internet of
Things and fog computing environment in current IT space. Researchers and Information …

A survey of attacks and countermeasures in mobile ad hoc networks

B Wu, J Chen, J Wu, M Cardei - Wireless network security, 2007 - Springer
Security is an essential service for wired and wireless network communications. The
success of mobile ad hoc network (MANET) will depend on people's confidence in its …

[PDF][PDF] HIASA: Hybrid improved artificial bee colony and simulated annealing based attack detection algorithm in mobile ad-hoc networks (MANETs)

PS Prasad, SKM Rao - Bonfring International Journal of Industrial …, 2017 - academia.edu
A Mobile Ad-hoc Network (MANET) is a persistently self configuring, infrastructure-less
network of mobile devices in which every device is wireless, be in motion devoid of …

A specification-based intrusion detection system for AODV

CY Tseng, P Balasubramanyam, C Ko… - Proceedings of the 1st …, 2003 - dl.acm.org
The Ad hoc On-Demand Distance Vector (AODV) routing protocol, designed for mobile ad
hoc networks, offers quick adaptation to dynamic link conditions, low processing and …

Insider attacker detection in wireless sensor networks

F Liu, X Cheng, D Chen - IEEE INFOCOM 2007-26th IEEE …, 2007 - ieeexplore.ieee.org
Though destructive to network functions, insider attackers are not detectable with only the
classic cryptography-based techniques. Many mission-critic sensor network applications …

A study of different types of attacks on multicast in mobile ad hoc networks

HL Nguyen, UT Nguyen - Ad Hoc Networks, 2008 - Elsevier
We present a simulation-based study of the impacts of different types of attacks on mesh-
based multicast in mobile ad hoc networks (MANETs). We consider the most common types …

[LLIBRE][B] Security for wireless ad hoc networks

F Anjum, P Mouchtaris - 2007 - books.google.com
This book addresses the problems and brings solutions to the security issues of ad-hoc
networks. Topics included are threat attacks and vulnerabilities, basic cryptography …