JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET

V Laxmi, C Lal, MS Gaur, D Mehta - Journal of Information Security and …, 2015 - Elsevier
Mobile ad hoc networks (MANETs) are vulnerable to various types of attacks due to
inherently in-secure wireless communication medium and multihop routing communication …

DDCA-WSN: A distributed data compression and aggregation approach for low resources wireless sensors networks

E Tagne Fute, HM Kamdjou, A El Amraoui… - International Journal of …, 2022 - Springer
Abstract Wireless Sensor Networks (WSN) have been as useful and beneficial as resource-
constrained distributed event-based system for several scenarios. Yet, in WSN, optimisation …

MR-AODV: A solution to mitigate blackhole and grayhole attacks in AODV based MANETs

RH Jhaveri - 2013 Third International Conference on Advanced …, 2013 - ieeexplore.ieee.org
Role of ad-hoc networks has become vital in ubiquitous computing. Ad-hoc On-demand
Distance Vector (AODV) is such a routing protocol which is susceptible to a variety of …

[PDF][PDF] A survey on security challenges in the current MANET routing protocols

FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …

A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability

B Zahednejad, H Teng, S Kosari… - International Journal of …, 2023 - Wiley Online Library
With the rapid development of Internet of Things (IoT), designing a secure two‐factor
authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols …

Node service ability aware packet forwarding mechanism in intermittently connected wireless networks

D Wu, P Zhang, H Wang, C Wang… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Intermittently connected wireless networks (ICWNs) have been studied in recent years to
solve the disruption problem in mobile ad hoc networks and improve the utilization of …

A survey of attacks in mobile ad hoc networks

R Meddeb, B Triki, F Jemili… - … on engineering & MIS …, 2017 - ieeexplore.ieee.org
The vulnerabilities of Mobile Ad Hoc Networks (MANETs) are subject of numerous kinds of
attacks. Many classification schemas and taxonomies of MANET attacks have been …

Mobile Ad-hoc Networking with AODV: A Review.

RH Jhaveri, NM Patel - International Journal of Next …, 2015 - search.ebscohost.com
Abstract Mobile Ad-hoc Networks (MANETs) are becoming a promising and popular way to
carry out ubiquitous computing in numerous vital applications. Unique characteristics of …

Reputation-based secure routing protocol in mobile ad-hoc network using Jaya Cuckoo optimization

C Ram Mohan, VR Ananthula - International Journal of Modeling …, 2019 - World Scientific
The advancements in Mobile Ad-hoc Network (MANET) are suitable to wide applications,
which involve military applications, civilian domains, and disaster recovery systems. It is …

Wormhole attack: A new detection technique

ZA Khan, MH Islam - 2012 International Conference on …, 2012 - ieeexplore.ieee.org
The advancement in wireless technologies and the high availability of wireless equipment in
everyday devices is a factor in the success of infrastructure-less networks. MANETs are …