A fog computing based system for selective forwarding detection in mobile wireless sensor networks

Q Yaseen, F AlBalas, Y Jararweh… - 2016 IEEE 1st …, 2016 - ieeexplore.ieee.org
Intrusions detection is one of the major issues that worry organizations in wireless sensor
networks (WSNs). Many researchers have dealt with this problem and have proposed many …

Trust-based security for the OLSR routing protocol

A Adnane, C Bidan, RT de Sousa Júnior - Computer Communications, 2013 - Elsevier
The trust is always present implicitly in the protocols based on cooperation, in particular,
between the entities involved in routing operations in Ad hoc networks. Indeed, as the …

Evolutionary computation techniques for intrusion detection in mobile ad hoc networks

S Sen, JA Clark - Computer Networks, 2011 - Elsevier
Intrusion detection on mobile ad hoc networks (MANETs) is difficult. This is because of their
dynamic nature, the lack of central points, and their highly resource-constrained nodes. In …

Mitigating denial of service attacks in OLSR protocol using fictitious nodes

N Schweitzer, A Stulman, A Shabtai… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
With the main focus of research in routing protocols for Mobile Ad-Hoc Networks (MANET)
geared towards routing efficiency, the resulting protocols tend to be vulnerable to various …

Detecting black hole attacks in tactical MANETs using topology graphs

E Gerhards-Padilla, N Aschenbruck… - … IEEE Conference on …, 2007 - ieeexplore.ieee.org
Black hole attacks are a serious threat to communication in tactical MANETs. In this work we
present TOGBAD a new centralised approach, using topology graphs to identify nodes …

Cross-layer detection of sinking behavior in wireless ad hoc networks using SVM and FDA

JFC Joseph, BS Lee, A Das… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
The uniqueness of security vulnerabilities in ad hoc networks has given rise to the need for
designing novel intrusion detection algorithms, different from those present in conventional …

Detecting wormhole attacks in mobile ad hoc networks through protocol breaking and packet timing analysis

MA Gorlatova, PC Mason, M Wang… - MILCOM 2006-2006 …, 2006 - ieeexplore.ieee.org
We have implemented a fully-functional wormhole attack in an IPv6 802.11 b wireless
mobile ad hoc network (MANET) test bed running a proactive routing protocol. Using …

New MPR computation for securing OLSR routing protocol against single black hole attack

A Nabou, MD Laanaoui, M Ouzzif - Wireless Personal Communications, 2021 - Springer
Abstract The Optimized Link State Routing Protocol (OLSR) operates as proactive routing
protocol destined for Mobile Ad hoc Network, OLSR is considering as one of the four …

Denial of service attack solution in OLSR based manet by varying number of fictitious nodes

R Bhuvaneswari, R Ramachandran - Cluster Computing, 2019 - Springer
Abstract The Mobile Ad Hoc Network (MANET) is formed by group of mobile nodes and such
group of nodes is flexible in creating links with the other nodes in the network frequently. The …

Nis01-2: A collusion attack against olsr-based mobile ad hoc networks

B Kannhavong, H Nakayama, N Kato… - IEEE Globecom …, 2006 - ieeexplore.ieee.org
Rapid advances in wireless networking technologies have made it possible to construct a
mobile ad hoc network (MANET) which can be applied in infrastructureless situations …