JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET
Mobile ad hoc networks (MANETs) are vulnerable to various types of attacks due to
inherently in-secure wireless communication medium and multihop routing communication …
inherently in-secure wireless communication medium and multihop routing communication …
DDCA-WSN: A distributed data compression and aggregation approach for low resources wireless sensors networks
E Tagne Fute, HM Kamdjou, A El Amraoui… - International Journal of …, 2022 - Springer
Abstract Wireless Sensor Networks (WSN) have been as useful and beneficial as resource-
constrained distributed event-based system for several scenarios. Yet, in WSN, optimisation …
constrained distributed event-based system for several scenarios. Yet, in WSN, optimisation …
MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs
RH Jhaveri - 2013 Third International Conference on Advanced …, 2013 - ieeexplore.ieee.org
Role of ad-hoc networks has become vital in ubiquitous computing. Ad-hoc On-demand
Distance Vector (AODV) is such a routing protocol which is susceptible to a variety of …
Distance Vector (AODV) is such a routing protocol which is susceptible to a variety of …
[PDF][PDF] A survey on security challenges in the current MANET routing protocols
FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …
A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability
B Zahednejad, H Teng, S Kosari… - International Journal of …, 2023 - Wiley Online Library
With the rapid development of Internet of Things (IoT), designing a secure two‐factor
authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols …
authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols …
Node service ability aware packet forwarding mechanism in intermittently connected wireless networks
D Wu, P Zhang, H Wang, C Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Intermittently connected wireless networks (ICWNs) have been studied in recent years to
solve the disruption problem in mobile ad hoc networks and improve the utilization of …
solve the disruption problem in mobile ad hoc networks and improve the utilization of …
A survey of attacks in mobile ad hoc networks
The vulnerabilities of Mobile Ad Hoc Networks (MANETs) are subject of numerous kinds of
attacks. Many classification schemas and taxonomies of MANET attacks have been …
attacks. Many classification schemas and taxonomies of MANET attacks have been …
Mobile Ad-hoc Networking with AODV: A Review.
RH Jhaveri, NM Patel - International Journal of Next …, 2015 - search.ebscohost.com
Abstract Mobile Ad-hoc Networks (MANETs) are becoming a promising and popular way to
carry out ubiquitous computing in numerous vital applications. Unique characteristics of …
carry out ubiquitous computing in numerous vital applications. Unique characteristics of …
Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization
C Ram Mohan, VR Ananthula - International Journal of Modeling …, 2019 - World Scientific
The advancements in Mobile Ad-hoc Network (MANET) are suitable to wide applications,
which involve military applications, civilian domains, and disaster recovery systems. It is …
which involve military applications, civilian domains, and disaster recovery systems. It is …
Wormhole attack: A new detection technique
ZA Khan, MH Islam - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
The advancement in wireless technologies and the high availability of wireless equipment in
everyday devices is a factor in the success of infrastructure-less networks. MANETs are …
everyday devices is a factor in the success of infrastructure-less networks. MANETs are …